Skip to main content

Your strategy is proprietary.
We treat it that way.

Workspace isolation, role-based access, edge infrastructure, and AI providers that don't train on your data.

Workspace isolation

Every brand runs in an isolated workspace. Data, keywords, content, and research artifacts are scoped to the workspace level. Users can only access workspaces they've been explicitly invited to. There's no cross-workspace data leakage, even within the same organization.

Role-based access control

Authentication and authorization are handled by a dedicated authentication provider. Team members are assigned roles that control what they can view, edit, and approve. Brand-scoped routes verify access on every request. API keys are scoped to individual workspaces.

Infrastructure

RankDraft runs on globally distributed edge infrastructure with encrypted database storage, secure object storage, and asynchronous processing. All data stays within the provider's trust boundary. HTTPS is enforced on all endpoints. There are no self-managed servers.

AI model data handling

AI model calls use enterprise-grade providers with strict data handling policies. No provider uses customer data for model training. Research artifacts and drafts are stored in encrypted object storage and are not persisted by AI providers. Embeddings are generated and stored in isolated vector databases.

Security FAQ

Who can access my brand’s content and research data?

Only users who have been explicitly added to the brand's workspace. Access is verified on every API request using secure session tokens. Organization admins can manage team membership and roles.

Is my content used to train AI models?

No. Our AI providers do not use API customer data for model training. Your content briefs, drafts, and research artifacts are not used to improve any AI model.

Can I delete all my data?

Yes. Deleting a brand removes all associated data: keywords, content pieces, research artifacts, drafts, review scores, ranking snapshots, and embeddings. This is a permanent, irreversible operation.

Do you support security questionnaires for procurement?

Yes. Contact [email protected] and we'll coordinate security documentation, questionnaires, and compliance conversations as part of your evaluation.

Need security documentation for procurement? Contact sales