Safety – Considered from the very Beginning
No external access. Not even by RheinInsights.
No reverse proxies. Always with security trimming.
RheinInsights understands the importance of corporate and organizational knowledge. Therefore, we always implement Enterprise Search and permission-based Retrieval Augmented Generation (RAG). Furthermore, RheinInsights never needs access to customer data or systems.
Your Data - Your Governance
RheinInsights never has and never requires access to customer data or systems.
DThe RheinInsights Retrieval Suite is operated exclusively within the customers' governance. Both our on-premises version and our cloud offering are purely operated by the customers and on their premises.
Thus, neither RheinInsights nor the search engine vendors have direct access to the data, the connectors or the Suite itself. Access credentials for the source systems always stay secure.
Image: Your Hand Please – stock.adobe.com
On-Premises
On-premises versions of the RheinInsights Retrieval Suite run on local VMs or in local Docker environments.
Cloud
Our cloud offering is operated in an Azure Kubernetes cluster as part of the Azure cloud of the respective customers.
No Detours
The suite only ever connects to the source system, search engine, and LLM.
Credentials Always Remain at the Customer
The connectors are configured locally and do not, for example, open reverse proxies.
Cloud-Independent - When Needed
AI pipelines can be run entirely locally. For example, with an open-source search engine or Squirro, an on-premise LLM, our interface, or Open WebUI.
Security Trimming
Answers are generated only based on knowledge the respective can actually access.
Our opinion is that AI and search applications must always respect access rights in the knowledge systems.
Therefore, our AI pipelines, the search interface and connectors always implement Secure Search and permission-based Retrieval Augmented Generation. Users only ever receive answers based on knowledge they can access in the source system.
Secure Search and RAG
Our connectors always replicate the authorization scheme of the source system.
For All Databases or Search Engines
Security trimming is supported by our search interface and AI pipelines for all search engines and vector databases.
Always with OAuth and Impersonation
Slack, Microsoft Copilot, Microsoft Search, Open WebUI, Squirro, etc. only provide answers based on knowledge that users have access to.
No Data Loss
Our concept prevents data loss and data leaks - right from the start.
Interested in a trial?
Register for free in our customer portal, create a free demo license and download our RheinInsights Retrieval Suite.