Security
Your firm's data. On your terms.
Most legacy ops tools force you to choose between modern features and data control. WeBelieve doesn't — because the same codebase ships in two delivery shapes, and the boundary is yours to draw.
HOSTED SAAS
We run it.
- Region
- US-east primary, US-west failover
- Storage
- Managed Postgres, encrypted at rest (AES-256)
- Transport
- TLS 1.3, HSTS, certificate pinning
- Backups
- Hourly snapshots, 30-day point-in-time recovery
- Auth
- Email-password + OAuth, SAML/SSO on Team
- Audit log
- Read-only event stream, exportable
DESKTOP APP · V2
You run it.
- Where data lives
- Your machine. Period.
- Storage
- Local encrypted SQLite (SQLCipher)
- AI calls
- You choose: cloud LLM, self-hosted, or hybrid
- Identity
- Hosted by us (Keycloak) — only auth metadata
- Updates
- Signed delta packages, manual or auto
- Egress
- None by default. You whitelist what leaves.
Principles
A short statement of intent.
-
Your data is yours.
We don't train on customer data. We don't sell it. Exports are first-class and always available — you can pull a full dump of your firm's data at any time.
-
Sovereignty is a slider, not a switch.
Hosted is appropriate for most firms. For firms with regulatory data-residency obligations, Desktop puts the database on hardware you control. Same product. Same AI capability. Different posture.
-
Least-privilege everything.
Roles map to firm structure (partner, senior, staff, intake, billing). Permission checks happen at the data plane, not the UI.
-
Honest about pre-launch.
We don't claim a SOC 2 we haven't earned. The SOC 2 Type I report is in process; we expect it before V1 ships. We'll publish progress publicly.
For a current compliance status, security questionnaires, or to request a DPA, email hello@webelievesoftware.com.