How Sturdy Statistics Protects Your Data
At Sturdy Statistics, trust isn’t just a promise — it’s our foundation. We know that the data you entrust to us is invaluable, and we take our responsibility to protect it seriously. We also know that our processing plays an essential role in your operations. That’s why security, privacy, scalability, and dependability are built into everything we do.
Whether you have a tiny, specialized dataset or a massive one, our mission is simple: we help you unlock insights while ensuring your data stays secure and under your control. Every piece of information you upload is safeguarded by multiple layers of encryption, strict access controls, and ethical data handling practices. We never use your data for training, never share it, and never send it to external services. Your data belongs to you — we’re just here to help you harness its value safely.
Sturdy Pillars
At Sturdy Statistics, everything we build is guided by three core principles: Security, Scalability, and Dependability. These pillars ensure that no matter the size or complexity of your dataset, you can rely on us to process your data securely, efficiently, and with complete reliability.
- Security & Privacy
- Your data is encrypted, isolated, and accessible only to authorized users. We enforce strict security controls to protect your information at every step.
- Scalability
- Whether you’re working with a handful of documents or hundreds of millions, our platform is designed to handle any volume seamlessly.
- Dependability
- We know your data is mission critical. That’s why our systems are built for reliability, transparency, and availability — so you can trust the results every time.
Sturdy Security: How We Protect Your Data
At Sturdy Statistics, security is not an afterthought — it’s built into every layer of our platform. We protect your data with multiple independent layers of encryption and strict access controls, ensuring it remains secure at all times.
Encryption & Data Protection
We use industry-leading encryption to keep your data safe, both in transit and at rest. Our multi-layered security approach ensures that your information is protected at every stage.
- Encrypted in Transit & At Rest
- All data is encrypted using TLS 1.3 for transit and AES-256 at rest in AWS.
- Envelope Encryption
- We apply AES-128 or optionally quantum-resistant AES-256 envelope encryption on top of AWS encryption, formally isolating each organization’s data with unique data encryption keys.
- Key Management
- All data encryption keys are managed and rotated using AWS Key Management Service (KMS). We never store the keys on our own servers.
- Data Integrity
- Every time we read an encrypted file, we authenticate its integrity using a hash-based message authentication code (HMAC) based on SHA-256.
- Zero Data Retention Policy
- You can delete your data at any time. Upon request or account termination, we remove every copy, backup, and stored record.
Access Control & Authentication
We enforce strict authentication and access controls to ensure that only you and your authorized users can access your data.
- Secure API Keys
- We use 256-bit API keys with strict expiration policies. You can provision, revoke, and rotate keys anytime.
- Keys not Stored
- We never store your API keys on our server or anywhere else. One cannot access your data with only information stored on our servers; your API key is required to access your data.
- Constant-Time Verification
- Protects against timing attacks to prevent unauthorized access.
- Granular Permissions
- You control access at a fine-grained level, defining read/write permissions for each API key for each index.
- Employee Access Restrictions
- Our team follows a least-privilege model, meaning employees only have the access they absolutely need to perform their duties.
- Logging & Auditing
- All data access is logged, monitored, and regularly audited for security compliance.
These layered security measures make unauthorized access virtually impossible while ensuring that you always stay in control. Moreover, if you need extra security, you can choose to use our service as single-tenant SaaS with dedicated hardware, or even on-prem.
Your Data, Your Control
At Sturdy Statistics, your data belongs to you — and only you. We ensure that you retain full control while safeguarding your information with exceptionally strong security.
- Ownership
- You own all data you upload. We only process it in response to API calls you initiate. Your data is never used to train our models, and you can delete it at any time.
- Isolation
- Your data is completely isolated within your organization. It is never shared, pooled, or repurposed for any reason.
- Control
- We can operate with zero external dependencies — your data never leaves our infrastructure or interacts with third-party services.
- Security
- We implement multiple layers of encryption and strict access controls to keep your data safe.
- Retention
- You can delete any or all of your data at any time. Upon account termination, we permanently remove every copy, backup, and stored record — unless legal obligations require otherwise.
Deployment Options
Sturdy Statistics offers flexible deployment models to match your organization’s security, compliance, and scalability needs.
Multi-Tenant SaaS
Get started instantly with zero management overhead. Our multi-tenant cloud deployment ensures full data isolation while delivering seamless scalability and automatic updates.
- Best for
- Small to medium businesses or teams looking for fast setup with minimal maintenance.
- Security
- Your data remains encrypted and cryptographically isolated at all times.
- Scalability
- Automatically adapts to your growing data needs.
Single-Tenant SaaS
A dedicated cloud instance just for your organization — offering enhanced security, isolation, and customization, while we manage the infrastructure.
- Best for
- Enterprises with compliance requirements or custom integration needs.
- Security
- Full hardware-level data isolation, with dedicated resources and custom configurations.
- Control
- Choose your deployment region, instance types, and manage security policies to meet your needs.
On-Premise
Deploy Sturdy Statistics within your own infrastructure for complete autonomy over security, compliance, and data residency.
- Best for
- Organizations with strict data residency, regulatory, or security requirements.
- Security
- Full control over your environment, ensuring data never leaves your network.
- Customization
- Integrate seamlessly with your existing cloud or on-prem infrastructure.
Regardless of your deployment choice, you remain in control of your data, security, and privacy. Contact us to discuss the best option for your needs.
Frequently Asked Questions (FAQs)
Where and how is my data stored?
Your data is securely stored in AWS, encrypted both in transit (TLS 1.3) and at rest (AES-256). Additionally, we apply envelope encryption with unique data encryption keys per organization. You can delete your data at any time, and upon account termination, we remove all copies and backups.
Who has access to my data?
Only you and your authorized users can access your data. Sturdy Statistics employees do not have access unless explicitly permitted for support or compliance purposes. All access is strictly controlled, logged, and auditable.
What happens if my API key is compromised?
- Expiration & Granular Permissions
- Minimize exposure preemptively by setting expiration dates and limiting permissions.
- Key Management
- If an API key is compromised, you can take immediate action: rotate, pause, or revoke API keys instantly through the dashboard.
- Audit Logs
- View access logs in the dashboard to track API usage and identify suspicious activity.
Do you offer SLAs for uptime and support?
Yes. We commit to 99.9% uptime, excluding scheduled maintenance or external events. We respond to urgent issues within 3 hours and general inquiries within one business day. If we fail to meet our uptime commitments, you may be eligible for service credits.
Will my data be shared with third parties?
This is configurable. We can operate zero external dependencies, meaning your data never leaves our infrastructure and is never shared with any third parties. We offer an option to summarize your models and results using OpenAI’s latest models, which requires sending short excerpts of data to OpenAI. This data is encrypted in transit and at rest, and our Enterprise account with OpenAI prohibits them from storing or using it. This feature is a convenience, and is not at all essential for the functionality of Sturdy Statistics; you may disable it at any time.
Do you use my data to train AI models?
No. Your data is never used to train, update, or improve any AI models outside your organization. If you choose to use our AI-driven insights, the model is trained only on your uploaded data and remains isolated to your organization.
How can I trust the results from Sturdy Statistics?
Our proprietary AI is explainable by design — every decision made by our models is transparent, auditable, and backed by interpretable parameters. Additionally, our API can generate exact citations from your data, so you always understand how each conclusion was reached.
What happens if I delete my data?
If you delete any part of your data, it is permanently removed from all active storage. Upon account termination, we delete every copy, backup, and encryption key, ensuring no residual traces remain — unless legally required otherwise.
Unlock Insights While Keeping Your Data Secure
Sturdy Statistics provides cutting-edge AI-powered data organization with privacy-first security. Whether you’re handling sensitive customer data or internal analytics, we ensure maximum security and complete control.
Request a Demo, or Try it Yourself, and see Sturdy Stats in action today.