Skip to content

Security

Your firm's data. On your terms.

Most legacy ops tools force you to choose between modern features and data control. WeBelieve doesn't — because the same codebase ships in two delivery shapes, and the boundary is yours to draw.

HOSTED SAAS

We run it.

Region
US-east primary, US-west failover
Storage
Managed Postgres, encrypted at rest (AES-256)
Transport
TLS 1.3, HSTS, certificate pinning
Backups
Hourly snapshots, 30-day point-in-time recovery
Auth
Email-password + OAuth, SAML/SSO on Team
Audit log
Read-only event stream, exportable

DESKTOP APP · V2

You run it.

Where data lives
Your machine. Period.
Storage
Local encrypted SQLite (SQLCipher)
AI calls
You choose: cloud LLM, self-hosted, or hybrid
Identity
Hosted by us (Keycloak) — only auth metadata
Updates
Signed delta packages, manual or auto
Egress
None by default. You whitelist what leaves.

Principles

A short statement of intent.

  • Your data is yours.

    We don't train on customer data. We don't sell it. Exports are first-class and always available — you can pull a full dump of your firm's data at any time.

  • Sovereignty is a slider, not a switch.

    Hosted is appropriate for most firms. For firms with regulatory data-residency obligations, Desktop puts the database on hardware you control. Same product. Same AI capability. Different posture.

  • Least-privilege everything.

    Roles map to firm structure (partner, senior, staff, intake, billing). Permission checks happen at the data plane, not the UI.

  • Honest about pre-launch.

    We don't claim a SOC 2 we haven't earned. The SOC 2 Type I report is in process; we expect it before V1 ships. We'll publish progress publicly.

For a current compliance status, security questionnaires, or to request a DPA, email hello@webelievesoftware.com.