HomeFeaturesHow It WorksPlatformSecurityPricingInvestorsAbout

Built for real clinical IT environments.

Enterprise-ready. Procurement-friendly. No surprises for your security team.

Quiet enterprise readiness.

Security is not a feature we bolt on. It is how we build. Every design decision starts with data protection. Every integration considers compliance. We do not add security—we start with it.

Protection at every layer.

🏥

HIPAA-Aligned Architecture

Designed from day one with healthcare compliance requirements in mind. Every component built to meet HIPAA technical safeguards.

📋

BAA Available

Business Associate Agreements ready for enterprise deployments. We take responsibility for PHI protection seriously.

🔒

No Training on Customer PHI

Your patient data stays yours. We do not use protected health information to train models. Your data is never used for anything other than serving you.

🗑️

Minimal Data Retention

We keep what we need and nothing more. Clear retention policies with automatic data purging. You control what stays and what goes.

🔐

Encryption Everywhere

AES-256 encryption for data at rest. TLS 1.3 for data in transit. End-to-end protection from device to storage.

👤

Access Controls

Role-based access. Multi-factor authentication. Comprehensive audit logs. You control who sees what.

Ready for procurement review.

We built Synexar knowing it would face security questionnaires. Here is what your IT team will find.

HIPAA-compliant infrastructure
Business Associate Agreement (BAA) included
AES-256 encryption (at rest and in transit)
SOC 2 Type II (in progress)
Regular penetration testing
Comprehensive audit logs
Role-based access controls
Multi-factor authentication
Minimal data retention policies
No PHI used for model training

* SOC 2 Type II certification in progress. Expected completion Q2 2025.

What happens to your data.

Processing

Data is processed in HIPAA-compliant infrastructure. All processing occurs within secure boundaries with audit logging enabled.

Storage

Encrypted at rest using AES-256. Stored in SOC 2 certified data centers. Geographic data residency options available.

Transmission

TLS 1.3 encryption for all data in transit. Certificate pinning in mobile applications. No data transmitted without encryption.

Retention

Configurable retention policies. Automatic data purging. Complete data export and deletion on request.

Questions for your security team?

We are happy to discuss security details, complete questionnaires, or schedule a call with our security team.