Menu Browse

Popular Use Cases

Security Architecture

Built to handle the
data other tools avoid.

We audit your employee access data. That means we're responsible for keeping it private, isolated, and immutable. Here's exactly how we do that.

PII Never Leaves Unmasked

Employee names and emails are tokenized in your isolated environment before any data reaches our AI APIs. The model sees masked tokens, not real identities.

Zero Plaintext Secrets

All credentials and API keys are encrypted with AES-256-GCM before storage. Nothing in environment variables, config files, or databases in plaintext.

Supply Chain Security

Third-party dependencies are continuously matched against the NVD vulnerability database. Known CVEs are surfaced before they reach production.

Privacy by Design

Local PII masking before any AI call.

When you upload a screenshot, a masking pipeline runs inside your dedicated AutoCISO environment before any data reaches an external AI API. Employee names, email addresses, and other PII are replaced with deterministic tokens.

The Vision AI receives a masked image. The AI extraction returns tokenized data. Only your isolated environment holds the token map — it never leaves your dedicated namespace.

marcus.webb@acme.com usr_a7f3b2c1@domain.tld
Marcus Webb USR_A7F3B2C1
Admin ROLE_ADMIN

Example: What the AI model actually sees after masking.

01

Screenshot captured & uploaded

Browser extension captures the page and uploads it securely over TLS to your dedicated AutoCISO namespace. The raw image is stored as an immutable evidence artifact.

02

PII detection scan

An NLP pipeline within your isolated namespace identifies names, emails, and phone numbers in the image using OCR — before any external API is called.

03

Deterministic tokenization

Each identity is replaced with a consistent token (same person → same token). Relationships are preserved, PII is removed. The token map is stored in your encrypted tenant namespace.

04

Masked image sent to Vision AI

GPT-4o Vision or Claude Vision processes the masked image. Raw PII never reaches an external API.

05

Results de-tokenized in your namespace

AutoCISO maps the extracted tokens back to real identities using the token map from your private encrypted namespace. Findings are stored in your isolated evidence vault.

Infrastructure

Enterprise infrastructure. SMB price.

AutoCISO runs on the same infrastructure stack that enterprise security companies use — just sized and priced for teams of 5–150.

AES-256 Encrypted Secrets

Secrets management

Every API key, credential, and secret is encrypted with AES-256-GCM before being written to the database. Nothing is ever stored in plaintext — not in environment variables, databases, or config files.

AES-256-GCM encryption · Encrypted at rest · Zero plaintext at rest

Supply Chain Security

Dependency & vulnerability tracking

AutoCISO continuously matches your third-party dependencies against the NVD vulnerability database. Known CVEs are surfaced before they reach production, with SBOM-style tracking of your software supply chain.

NVD CVE matching · SBOM-style tracking · Automated dependency scanning

TLS Everywhere

Transport security

All traffic is encrypted in transit using TLS 1.3. Certificates are managed by cert-manager with automatic renewal. No unencrypted HTTP anywhere in the system.

TLS 1.3 · cert-manager · Automatic renewal · HSTS enforced

Immutable Audit Trail

Evidence integrity

Every AI extraction is linked to its source screenshot with a tamper-evident hash. The evidence chain is write-once. Once evidence is archived, it cannot be modified — even by AutoCISO.

SHA-256 hashing · Write-once storage · Chain-of-custody maintained

Data Handling

You control your data.

We don't sell your data. We don't use it to train models. You can export everything at any time, and you can delete everything permanently with one click.

Is my data used to train AI models?
No. Your data is never used for model training. Not by us, not by our AI API providers (we use commercial tiers with data-processing agreements).
How long is data retained?
Evidence is retained for as long as your subscription is active, plus 90 days after cancellation. After that, it's permanently deleted.
Can I export my data?
Yes. Full export available at any time in JSON and PDF formats. Your data is always yours — export or delete it at any time.
Can I delete my data?
Yes. Account deletion triggers a complete purge within 48 hours. Includes all screenshots, findings, and credentials.

What we do

  • Mask PII before any external API call
  • Encrypt all secrets with AES-256-GCM
  • Isolate your data in a dedicated namespace
  • Log all access to your evidence vault
  • Use commercial AI APIs with DPAs
  • Delete all data on account closure (48h)

What we never do

  • Use your data to train AI models
  • Sell or share your data with third parties
  • Store plaintext credentials or API keys
  • Allow cross-tenant data access
  • Retain data after account deletion (beyond 48h)
423 ghost accounts found in the last 30 days

Security built in, not bolted on.

Start your free audit — your employee data stays on your machine until it's masked.