Features How It Works Who It's For Security
Sign In Get Started Free
Now available · Secure & GDPR-ready

Centralize Your Team's Knowledge

Stop digging through email chains and shared drives. Our Knowledge Vault gives your team one secure, searchable place for every document — with department-level access control built in.

Our Knowledge Vault
📁 All Documents 48
⭐ Favorites 5
📋
Q3 Financial Report 2024
Finance · PDF · 2.4 MB
FINANCE
🔐
IT Security Policy v3
IT · PDF · 1.1 MB
IT
📊
Client Onboarding Guide
Operations · PDF · 3.8 MB
GENERAL
👥
HR Employee Handbook
HR · PDF · 5.2 MB
HR

Built for professional teams

🏢 Consulting Firms 🏫 Schools & Colleges 🏛️ Government Agencies 🏗️ Property Management ⚕️ Healthcare Teams

Everything your team needs to manage knowledge

Built for real teams — not IT departments. Simple enough for day one, powerful enough to scale.

🔍

Full-Text Search Inside All SOPs

FTS5-powered search scans document titles, categories, summaries, and full body text. Results rank by relevance in milliseconds.

🛡️

6-Layer AI-Powered File Security

Every upload passes through extension whitelisting, MIME validation, magic-byte verification, filename sanitisation, size limits, and AI threat scoring before it is accepted.

🏢

Role-Based Access Control

Managers have full control. Consultants see only their department's documents plus company-wide content. Enforced server-side on every query — not just in the UI.

🏛️

Multi-Tenant Workspace Isolation

Every organisation gets a completely separate workspace. No data leaks between tenants — every database query is scoped by workspace ID at the SQL level.

Automatic Review Expiry Alerts

Set a review date on any document. Managers are automatically alerted before documents expire so nothing falls out of compliance unnoticed.

🤖

AI-Generated Summaries

Every uploaded PDF is automatically read and summarised with key action tips so your team grasps documents without reading every page.

📂

Version History

Every document update is tracked. Roll back to any of the last five versions or audit who changed what and when.

📋

Tamper-Evident Audit Trail

Every login, upload, edit, view, and deletion is logged with timestamp and IP. Every stored file carries a SHA-256 integrity hash verified on every download.

Up and running in three steps

No complex setup. No IT tickets. Your team is productive from day one.

1

Create Your Workspace

Sign up and get a unique workspace URL. Invite your team with a single link — no licence keys or procurement process required.

2

Upload & Organise

Drag in your PDFs. Assign departments. Our AI reads every document and writes a plain-English summary with action points for you.

3

Search & Share

Your team can find any document in seconds. Access is automatically restricted so consultants only see what's relevant to their role.

Designed for knowledge-driven teams

Whether you manage a portfolio of buildings or a school's compliance library, Our Knowledge Vault fits your workflow.

🏢

Consulting Firms

Give every consultant access to the right documents for their engagement — nothing more, nothing less.

🏢
🏗️

Building Management

Centralise maintenance logs, lease agreements, compliance certificates, and contractor SOPs in one secure location.

🏗️
🏫

Schools & Colleges

Store policies, safeguarding documents, and teaching resources with role-based access for admin, staff, and leadership.

🏫
🏛️

Government & Public Sector

Maintain a verifiable audit trail for every document. Meet compliance requirements without manual paperwork.

🏛️

Numbers that matter to your team

AES-256
All files encrypted at rest with AES-256-CBC
6-Layer
Security pipeline on every file upload
100%
Audit coverage — every action is logged with IP
NIST
800-53 controls implemented, not just referenced

Not just written — fully implemented

Every control below is live code running in production. No checkbox compliance theatre.

🔒

AES-256 Encryption at Rest

Every uploaded file is encrypted on disk (NIST SC-28). Legacy files load without disruption.

🔏

SHA-256 Integrity Hashing

Each file's hash is stored at upload and verified on every download (NIST SI-7). Tampering is detected instantly.

🔑

bcrypt Passwords — Cost 12

All passwords are hashed using bcryptjs at cost factor 12. Plain-text passwords never touch the database.

🎫

JWT + Server-Side Revocation

Signed JWT tokens. Logout adds the token to a blocklist so stolen tokens can't be replayed (NIST AC-12).

🚫

Account Lockout — NIST AC-7

Account locks for 15 minutes after 5 failed login attempts. Every failure is logged with IP.

⏱️

Session Timeout — NIST AC-11

Sessions auto-expire after 30 minutes of inactivity with a 5-minute warning before forced logout.

🛡️

Security Headers — OWASP A05

Helmet enforces CSP, HSTS (1 year), X-Frame-Options, X-Content-Type-Options, and Referrer-Policy on every response.

📊

Rate Limiting — OWASP A07

Auth endpoints: 20 attempts per 15 min. API: 200 req/min. Brute-force and credential-stuffing are blocked at the network layer.

💉

Parameterised Queries — OWASP A03

Every database call uses prepared statements. SQL injection is structurally impossible — not just filtered.

🗂️

Path Traversal Guard

All file paths are resolved and verified to stay inside the uploads directory before any read or write.

🤖

6-Layer File Security Pipeline

Upload validation: rate-limit → extension → magic bytes → filename sanitisation → size limit → AI threat scoring.

📋

Tamper-Evident Audit Log

Every action (login, upload, view, edit, delete) is logged with user ID, timestamp, and IP. Compliance-ready from day one.

Your team's knowledge is your greatest asset.

Start securing and organising it today. Free to get started, no credit card required.

Start Free Trial Request a Demo