Security that matches your trust bar.
Tracefox ships with multi-tenant isolation, scoped API keys, and default query bounds to keep your data safe.
Tenant isolation
Every request enforces tenant and project scoping.
Data controls
Retention policies, usage caps, and export audits with ClickHouse-backed logs.
Compliance-ready
SOC2-aligned controls, audit trails, and security review support.
Security architecture, layered by design
Tracefox applies controls at ingest, storage, and query time so teams can trust every surface of the platform.
Ingestion Scoped API keys, rate limits, schema validation. OTLP validation + PII safeguards.
Storage Encryption at rest, retention policies, backups. Dedicated clusters for Enterprise.
Query + AI Bounded queries, cost previews, audit trails. Tenant-scoped AI copilot actions.
Guardrails at every layer
Controls are enforced at ingest, storage, and query time to keep tenant data isolated and auditable.
- Scoped ingestion keys and rate limits
- Encryption + retention policies
- Bounded queries with audit logs
Platform protections
- Scoped API keys for ingestion and admin access.
- Bounded query defaults to prevent data spills.
- Encryption in transit and at rest.
- Dedicated VPC deployments for Enterprise.
- Audit trails for alerting, changes, and AI summaries.
Security contact
Have a vulnerability report or security question?
Email security@tracefox.ai and our team will respond within one business day.
Need more? Visit our Trust Center.