Security review should not require a second sales call.
Policies, certifications, subprocessors, and review contacts in one place.
Compliance and assurance
Certifications and review artifacts.
Core certifications stay visible. Supporting documents stay one click away.
Certification
SOC 2 Type II Certified
Certification
GDPR Compliant
Certification
ISO 27001 Certified
Assurance pack
Supporting artifacts live in MyCroft.
Controls and safeguards
Controls reviewers usually ask about.
Encryption, access, monitoring, incident handling, resilience, and auditability.
Incident response alerts
Incident response plan
Encryption controls
Encryption management
Endpoint encryption
Platform availability monitoring
Platform availability alerts
Platform availability architecture
Role-based access
Access review
Application authentication
Multi-factor authentication
Architecture diagram
Vulnerability management
Subprocessors
Subprocessors are named and scoped.
Every third-party service Duvo uses is listed with its role below.
Platform / foundational AI
Google Cloud Platform
Development and version control
GitHub
Frontend cloud platform
Vercel
Foundational AI
Anthropic
Sandboxed execution
E2B
Communication and collaboration
Slack
Resources
Start with what you can read now.
Public documents are linked here. Others can be requested through MyCroft.
Public
Privacy policy
Public
Terms of Use
Public
Cookie Policy
MyCroft
Review documents in MyCroft
Frequently asked questions
Direct answers for the first review.
Common questions from security reviews.
What happens to our sensitive data?
Duvo does not train its own or third-party models on customer data. Where supported, model traffic runs in zero-data-retention mode so prompts and outputs are not stored for model training.
Can we bring our own AI endpoint?
Yes. Duvo supports customer-managed and dedicated AI endpoints, including single-tenant deployments where teams need tighter control.
Can you get EU or US data residency?
Yes. Hosting, model routing, and browser sandboxes can be constrained to EU-only or US-only infrastructure based on regulatory and internal requirements.
How do you ensure confidential data is not exposed within one team?
Access follows the scope of the user or role that starts the task. Tenant isolation is enforced across the application and data layers, and sensitive actions can require human approval.
How is data cached, logged, and versioned during agent execution?
Duvo minimizes retained data and stores what is needed for auditability and troubleshooting. Logs focus on actions and outcomes, data at rest is encrypted, traffic in transit uses TLS, and run history is tracked with audit trails.
All review documents in one place.
Request security, compliance, or procurement documents directly through MyCroft.