Enterprise-grade Security and Governance
For business users who need agentic, verifiable data prep and analysis
Prophecy is trusted by some of the world’s largest organizations to handle sensitive, business-critical data.
Governance, Risk Management, and Compliance by Design
We built the Prophecy platform from the start with technical and physical controls to protect the confidentiality, integrity, and availability of your data.
SOC 2 Type II certified
An independent audit verifying that security and operational controls were effective over an extended period of time. SOC 2 Report
No customer data storage
Your data never leaves your governed cloud environment, reducing compliance risk for your organization.
Enterprise-grade access controls
SSO, MFA, RBAC, and full audit logging reduce risk, improve compliance, and enhance operational efficiency.
Encryption at rest and in transit
Your data is encrypted while stored and when moving between systems.
Access Control and Accountability
Prophecy provides rich product security features to safeguard user access, data integrity, and compliance.
Authentication
Prophecy supports multiple authentication methods to ensure that only authorized individuals can access the platform, including:
Authorization
Role-Based Access Control (RBAC) enforces a “least privilege” model, granting users only the permissions they need. Each user is assigned one or more roles that determine what actions they can perform and what resources they can access.
Auditing
Detailed auditing capabilities log all user and admin activities for complete transparency and accountability. Your audit logs are stored in the same cloud platform as your deployment – e.g., for AWS deployments, audit logs are stored in Amazon S3; on Google Cloud Platform, they’re stored in Google Cloud Storage.
Data protection
Data is protected through encryption at rest and in motion, with compliant key management practices to safeguard sensitive information. While Prophecy code is stored in Git repositories, your data is not.
Trust Center Reports
Download official documents and reports about:
AI assistance you can trust
Prophecy has a privacy-first approach to AI Large Language Model (LLM) security, ensuring that AI functionality remains transparent, secure, and trustworthy.
No data stored or sent to LLM providers
Prophecy does not store or send your data to any third-party large language model (LLM) providers. Instead, Prophecy builds its knowledge graph from structural metadata about your data environment. This innovative approach lets Prophecy interface with LLM providers while keeping your data private and safely controlled within your own storage environment.
AI agent can suggest, but can’t make business decisions
Prophecy’s agent helps you build and modify data workflows while you retain control over review, approval, and execution.
Classified as “Minimal Risk”
AI App
Prophecy Data Transformation Copilot is classified as a “minimal risk” AI application, in accordance with the EU Artificial Intelligence Act.
Choice of Secure Deployment Models
Body: Prophecy lets you choose deployment options that meet your business requirements for security and isolation while aligning with your management policies and preferences.

SaaS
The highly secure, scalable SaaS deployment option is entirely Prophecy-managed and operates on a multi-tenant architecture with multiple layers of logical isolation. This model provides the fastest access to the latest features and updates. It runs on Prophecy’s AWS Virtual Private Cloud.
You can quickly evaluate Prophecy using our SaaS environment by signing up for a free trial.

Dedicated SaaS
The Dedicated SaaS deployment combines the convenience of Prophecy-managed infrastructure with the privacy and isolation of a single-tenant architecture. This model operates on Prophecy’s AWS or Azure Virtual Private Cloud, providing dedicated resources and enhanced security.
You can choose your preferred cloud platform (AWS, Azure, or Google Cloud Platform), and Prophecy will manage installation, maintenance, resource allocation, and more. Explore deployment options
