
SOC 2 Certified
Data Encryption
Your IP Stays Protected
Trusted by Mechanical Engineers at
Business & Enterprise customers data and IP are secure - Leo AI does not use your CAD files or documents to train its AI model. Your IP is never shared, copied, or accessed by third parties.
Leo transforms your data into non-reversible encrypted vectors (lists of numbers) using a patented encryption method. These are stored in secure GCP cloud environments.
Leo’s Large Mechanical Model (LMM) is trained exclusively on trusted engineering sources, Assemblies and parts curated by our team - not on your company’s proprietary data. It is purpose-built to serve mechanical engineers, not for general users.
Our LMM is being developed by our in-house research group making significant strides in avhieving a truly mechanical model
We regularly conduct full-scale penetration tests with external security experts. Our most recent test covered all Leo endpoints and passed with zero critical findings.
Data encrypted in transit and at rest
Role-based access
No long-term storage of sensitive files
Built-in access control mechanisms for enterprise teams

Leo is SOC 2 Type II Certified. We successfully completed a third-party audit of our internal controls, meeting the highest standards for security, availability, and confidentiality.

We handle and process personal data in accordance with the principles of the GDPR, including, without limitation, employing adequate technological and organizational measures to safeguard such data.
How Leo Handles Your Data
Leo uses a patented method to index your CAD and text files by converting them into encrypted vectors that capture their essence and context.
These vectors cannot be reverse-engineered — in plain terms, your CAD and text files cannot be reconstructed from them. This commitment is outlined in our Privacy Policy and supported by our SOC 2 controls.
Leo stores only these encrypted vectors, never your original files. Your data remains exactly where it is today — in your PLM, PDM, or Windows directories.
Our team provides verified security documentation upon request under NDA.
Enterprise Support & Security Reviews
For enterprise customers, our team provides direct support for your security, compliance, and IT stakeholders. We’re also happy to complete security questionnaires and participate in procurement reviews.
Security Review Assistance
Custom Documentation
Named Security Contact