NxtOne is built on the principle that understanding your system should never compromise its safety. We capture execution semantics — never your source code, business data, or PII.
Three principles guide every architecture decision, data flow, and access control in the platform.
The NxtOne agent captures execution relationships — method calls, service interactions, data flows. It never reads, transmits, or stores your source code, variable values, or business data. We capture the shape of behavior, not the content.
All data is encrypted in transit with TLS 1.3 and at rest with AES-256. API keys are hashed with bcrypt. Secrets are managed via AWS Secrets Manager with automatic rotation. There is no unencrypted path through the system.
Choose cloud-hosted or self-hosted deployment. Set data retention policies per tenant. Request full data export or deletion at any time. We never use customer data for model training or any purpose beyond providing the service.
A transparent view of how execution data moves through the NxtOne platform — what’s captured, what’s filtered, and what’s stored.
Full transparency on exactly what the NxtOne agent collects from your runtime environment.
No shortcuts. Every data path in the NxtOne platform is encrypted with industry-standard algorithms.
Where we are today and what’s on the roadmap. We’re transparent about our compliance journey.
| Standard | Scope | Status |
|---|---|---|
| GDPR | Data protection for EU users. Data stored in eu-west-2. DPA available on request. | Compliant |
| SOC 2 Type II | Security, availability, and confidentiality controls. Annual audit. | In Progress |
| ISO 27001 | Information security management system certification. | In Progress |
| UK Data Protection Act | Compliance with UK GDPR equivalent. ICO registration. | Compliant |
| HIPAA | Healthcare data handling controls for US enterprise customers. | Planned |
| CCPA | California Consumer Privacy Act compliance. | Compliant |
We take security reports seriously and respond within 24 hours. If you’ve discovered a security issue in any NxtOne service, please report it responsibly. We offer a safe harbor policy — good-faith security researchers will never face legal action.
Our team is happy to walk through our security architecture, compliance posture, or arrange a dedicated security review for your organization.