Tablize is built so the security-conscious version of you stays in control: your data, your keys, your decisions. The agent's job is to help you analyze — not to acquire access it doesn't need.
Every Tablize workspace is a dedicated machine with its own PostgreSQL instance, its own S3 storage, its own MQTT broker. Workspaces never share storage. Your data isn't commingled with anyone else's, including ours.
The Tablize runtime is open source. From Pro tier upward, you can run the entire platform on your own infrastructure — your servers, your VPC, your data never leaves your perimeter. The cloud and self-hosted versions ship the same binary.
You can supply your own Anthropic, OpenAI, or other provider API key. The agent will route through your account; your prompts and your data never touch our pooled LLM credits. If you use the Tablize-managed LLM pool, prompts and responses pass through our LLM router but are not retained beyond the request.
When you connect a Postgres or MySQL database to Tablize, the recommended configuration uses a read-only role. The agent reads, queries, analyzes — but cannot modify or drop. Write access is explicitly opt-in per database, with all writes routed through the Confirmation Center for human approval.
Tablize is in a deliberate early stage and we're honest about what that means: we don't yet hold SOC 2 Type II or ISO 27001 certifications. We are building toward SOC 2 readiness through Drata-style controls (access reviews, change-management policies, vendor reviews), with an audit window planned. For regulated industries today, the self-hosted option is usually the right fit — you inherit your own compliance posture.
We take security reports seriously. Email security@tablize.com with details. We commit to acknowledging your report within 48 hours and treating researchers operating in good faith with safe harbor.
Different teams care about different specifics. If your security review needs detail not covered above — penetration test results, DPA, sub-processor list, specific control documentation — email security@tablize.com and we'll respond.
For the strictest data sovereignty requirements, run Tablize on your own infrastructure. The same binary, your servers, your network perimeter.
See self-hosting