Enterprise AI with built-in governance, PII protection, data classification, audit trails, and encryption—designed for regulated industries.
OpenRails includes a dedicated pipeline for detecting and redacting personally identifiable information before it enters the knowledge base or is exposed in responses.
Configurable PII detectors scan ingested content for names, email addresses, phone numbers, social security numbers, credit card numbers, and other sensitive patterns.
Each detected PII instance is classified by type and confidence score. Low-confidence detections are flagged for human review.
PII is redacted, masked, or tokenized based on your governance policy. Original values can be stored in a separate secure vault if reversible de-identification is required.
Every detection and redaction action is logged with timestamp, entity type, confidence, and action taken—creating a complete audit trail.
Every piece of content in OpenRails is assigned a security tier. This classification governs who can access what, at every layer of the system — from open access through to highly restricted.
Comprehensive logging captures every significant action in the system for compliance review and forensic analysis.
For organizations in regulated industries, on-premise deployment ensures no data leaves your controlled environment.
All data—documents, embeddings, chat logs, agent outputs—resides on your infrastructure. No cloud dependency required.
Run with local AI models for fully air-gapped environments with zero external network access.
Integrate with your existing network security, firewalls, VPNs, and identity providers.
All data is encrypted at rest with enterprise-grade encryption. Key rotation is supported without system downtime.
OpenRails evaluation framework goes beyond testing AI quality — it can verify your security boundaries are enforced through the AI layer. Run evaluations as a specific user or permission level to confirm that restricted content never appears in AI responses.
Auditor-ready: Generate evidence that your access controls hold end-to-end, including through LLM-generated responses. Schedule these evaluations to run automatically and flag any violations immediately.