Security
At Lev, safeguarding your data is our highest priority. Our platform is built with multi-layered security measures and strict privacy controls to protect your sensitive information at every level.
Network architecture
Our infrastructure is designed with security as a foundational principle. The diagram below illustrates how data flows through our system, with encryption applied at every stage.
Network Architecture
Data Flow Overview
Infrastructure security
Our platform is hosted on Amazon Web Services (AWS), a leading cloud provider that maintains rigorous compliance certifications including SOC 2, ISO 27001, and more. This foundation provides enterprise-grade security controls that would be cost-prohibitive to implement independently.
Even if there is an interruption to one system, the rest of our services stay up and secure with physically separated database instances. This architecture eliminates single points of failure and ensures business continuity.
physical_security
AWS data centers provide comprehensive physical security controls:
network_security
All network traffic is encrypted and continuously monitored:
Data protection & encryption
All data is encrypted both at rest and in transit. We implement strict data classification and handling procedures with purpose limitation controls, ensuring your information is protected throughout its lifecycle.
encryption_standards
at_restin_transitkey_mgmtAccess control
We request only the minimum permissions needed to enable the functionality you want, with strict access controls and usage limitations. This principle of least privilege is fundamental to our security architecture.
For enterprise customers, we support SAML-based Single Sign-On, allowing you to connect Lev with your existing identity provider for seamless and secure authentication.
Authentication Flow
authentication
Multiple layers of identity verification protect your account:
authorization_monitoring
Fine-grained controls and continuous oversight:
LLM usage
Lev uses Large Language Models (LLMs) to power intelligent automation features. Here's how we handle your data when processing with AI.
model_providers
openaiZDR (Zero Data Retention) API. Prompts and completions are not stored after processing.anthropicgeminidata_protection
no_trainingzero_retentionminimal_contextdata_scope
sentnever_sentEmail integration security
Two key principles guide our email integration: no human access and deal-relevant filtering. Your contacts remain completely private and only visible to you.