Skip to content
Security & Deployment

Deploy on-prem. Keep case data under your control.

Latch is built for teams that need case data, AI models, and identity to stay inside their own boundary. Deploy on-prem, in your private cloud, or air-gapped. The same governed workflows and immutable audit logging work regardless of deployment model.

Identity

Authentication is part of the workflow

Sensitive actions stay tied to real user identity instead of generic service screens or shared inbox access.

Permissions

RBAC stays visible

The platform can align action availability and execution to role and permission policy so control does not disappear behind UI shortcuts.

Isolation

Tenant and environment boundaries matter

Production, UAT, and tenant-specific workflows can stay separated so trust survives growth and complexity.

Deployment

On-prem, private cloud, or managed

Deploy Latch inside your own environment so case data, AI models, and execution never leave your boundary. Meet data residency and regulatory requirements without architectural compromise.

AI control boundary

Your models, your environment, your control

For regulated teams, the real question is not whether AI is in the workflow. It is whether the AI models run inside your boundary, whether you choose the inference provider, and whether every AI-assisted decision is recorded in the immutable audit log.

Control point

Run Latch in your environment

Deploy Latch inside your own environment when the workflow, data, and identity boundary need to stay under your control.

Control point

Use the model that fits

Use Latch-managed models, your own models, or customer-owned models, then capture reviewed decisions, corrections, and outcomes through workflow hooks.

Control point

Add human review at the right step

Require human review where the risk is real: before a route is trusted, before a sensitive action runs, or before a higher-impact workflow moves into execution.

Security Q&A

Questions security and control owners ask

These questions come up when buyers want to know whether a faster workflow can still meet their trust and governance requirements.

Where does data live?

Latch is built for teams that care where case data, attachments, and identity live. It supports controlled deployment options, including running inside your own environment, so the setup can match your requirements.

How are users and permissions managed?

Authentication and roles and permissions are part of the product, not an add-on. Sensitive actions stay tied to identity, permission checks, and human review instead of informal trust.

How does tenant or environment isolation work?

The product supports strong separation between environments and tenants so case data, identity scopes, and workflow permissions do not bleed across boundaries.

Can Latch work with our own or a customer's model?

Yes. Latch can sit above the model layer so teams can use Latch-managed models, bring their own, or work with customer-managed models while workflow hooks capture reviewed outcomes, corrections, and execution feedback.

Can this fit regulated environments?

Yes. Latch is built around control, auditability, and plugin-driven execution because those are the concerns that matter most in stricter internal or regulated environments.

Review the control model

Talk through identity, tenancy, and deployment boundaries

If your team needs workflows to stay controlled as you grow, we can walk through how Latch handles access, execution, and traceability.