Plurall AI
Sign inTalk to us
Trust · Security

Security

Plurall AI encrypts customer media in transit and discards source files after the scan window. We anchor every audit packet to a ZK ledger so customers can verify integrity without trusting us.

Encryption (transit)
TLS 1.3, mTLS for partner ingest
Encryption (at rest)
AES-256-GCM, region-pinned KMS keys
Default media classification
Customer Confidential
Source media retention
Until scan completion, then discarded
Audit packet retention
7 years for paid plans
Penetration tests
Annual, by an external CREST-certified firm
Last verified
Apr 14, 2026

Customer source media is classified as Customer Confidential on ingest, encrypted on receipt, and processed in isolated worker pools. Demo rooms use Internal synthetic or sanitized data only and cannot reference production customer objects.

Audit packets are signed and anchored to our ZK ledger. The ledger root is published to a public L1 every six hours. Any third party can verify that a packet existed at a given time without seeing its contents.

Back to Trust Center
Plurall AI