Grounded AI chat with enterprise controls.
SSO. SLAs. Compliance. Dedicated support. For organizations where security and scale are non-negotiable.
For organizations that need more
You want AI chat grounded in your content. You also need it to pass security review, integrate with your identity provider, and come with contractual commitments.
Threada Enterprise delivers grounded AI chat with the controls and support larger organizations require.
What Enterprise includes
- Single sign-on (SSO) — OIDC and SAML. Integrate with your IdP. Enforce your policies.
- Service level agreement (SLA) — Contractual uptime commitments and defined response times.
- Compliance controls — Configurable retention, audit logging with export, evidence for reviews. GDPR-aligned handling.
- Data residency — Control where data is hosted. US-Central1 default; additional regions available for Enterprise.
- Dedicated support — Named contact, priority response, onboarding help. Quarterly reviews available.
- Custom volumes — Higher limits or uncapped usage based on your needs and contract.
- Advanced security — Formal threat model documentation. Security materials available for review.
Everything from lower tiers, plus
- All features from Starter, Growth, and Agency
- SSO (OIDC/SAML)
- SLA with uptime commitment
- Audit logs and compliance controls
- Custom retention policies
- Dedicated support contact
- Custom volumes and pricing
- Security documentation and review
How Enterprise engagement works
- Discovery — Requirements: security, compliance, volume, integrations.
- Security review — Documentation, questionnaires, technical review.
- Proposal — Terms and pricing aligned to usage and requirements.
- Onboarding — Dedicated support for rollout and governance.
- Ongoing — Priority support, regular reviews, roadmap input.
Security and compliance
Google Cloud Platform hosting. Encryption in transit (TLS 1.2+) and at rest (AES-256). Field-level encryption for sensitive data.
Content indexed for retrieval only—never used for model training. Retention windows and deletion on request.
Threat model covers prompt injection, XSS, SSRF, and data exfiltration.
Questions
What’s the minimum commitment?
Can you complete our security questionnaire?
Do you have SOC 2 certification?
Can we do a pilot first?
What regions are available for data residency?
How is Enterprise pricing determined?
Ready to talk?
Discuss requirements with our team or send a security questionnaire.