Safety – Considered from the very Beginning

No external access. Not even by RheinInsights.
No reverse proxies. Always with security trimming.

RheinInsights understands the importance of corporate and organizational knowledge. Therefore, we always implement Enterprise Search and permission-based Retrieval Augmented Generation (RAG). Furthermore, RheinInsights never needs access to customer data or systems.

Your Data - Your Governance

RheinInsights never has and never requires access to customer data or systems.

DThe RheinInsights Retrieval Suite is operated exclusively within the customers' governance. Both our on-premises version and our cloud offering are purely operated by the customers and on their premises.

Thus, neither RheinInsights nor the search engine vendors have direct access to the data, the connectors or the Suite itself. Access credentials for the source systems always stay secure.

Two hands shake hands
Image: Your Hand Please – stock.adobe.com

Icon

On-Premises

On-premises versions of the RheinInsights Retrieval Suite run on local VMs or in local Docker environments.

Icon

Cloud

Our cloud offering is operated in an Azure Kubernetes cluster as part of the Azure cloud of the respective customers.

Icon

No Detours

The suite only ever connects to the source system, search engine, and LLM.

Icon

Credentials Always Remain at the Customer

The connectors are configured locally and do not, for example, open reverse proxies.

Icon

Cloud-Independent - When Needed

AI pipelines can be run entirely locally. For example, with an open-source search engine or Squirro, an on-premise LLM, our interface, or Open WebUI.

 
Ein Schreibtisch in Düsseldorf

Security Trimming

Answers are generated only based on knowledge the respective can actually access.

Our opinion is that AI and search applications must always respect access rights in the knowledge systems.

Therefore, our AI pipelines, the search interface and connectors always implement Secure Search and permission-based Retrieval Augmented Generation. Users only ever receive answers based on knowledge they can access in the source system.

Icon

Secure Search and RAG

Our connectors always replicate the authorization scheme of the source system.

Icon

For All Databases or Search Engines

Security trimming is supported by our search interface and AI pipelines for all search engines and vector databases.

Icon

Always with OAuth and Impersonation

Slack, Microsoft Copilot, Microsoft Search, Open WebUI, Squirro, etc. only provide answers based on knowledge that users have access to.

Icon

No Data Loss

Our concept prevents data loss and data leaks - right from the start.

Interested in a trial?

Register for free in our customer portal, create a free demo license and download our RheinInsights Retrieval Suite.

 

Questions or Comments?

Contact us through our contact form or call us.