Security That's Non-Negotiable

Your bid data is your competitive advantage. FCIS was architected from day one to ensure it never leaves your machine.

Security at a Glance

Numbers that speak for themselves.

Data sent to cloud0 bytes
Local encryptionSHA-256
AI inference100% on-device
External endpoints2 of 2 audited

Four Pillars of Protection

Every layer designed to keep your data where it belongs.

Local Processing

All AI inference runs on your machine via Ollama at localhost:11434. Your bid data, cost models, and competitive intelligence never leave your hardware. No cloud. No middleman.

  • Ollama with Llama 3.1 8B runs locally
  • GPU-accelerated inference on your hardware
  • No data transmitted to external AI services
  • Full offline capability for analysis

Encrypted Storage

Your knowledge base and analysis results are stored with SHA-256 hashing and protected behind a PIN. Even if someone accesses your files, they can't read your data.

  • SHA-256 cryptographic hashing
  • PIN-protected application access
  • Encrypted SQLite database
  • Secure local file storage

Network Isolation

FCIS sends zero telemetry, zero analytics, and zero usage data. We don't track what you search, what you bid on, or how you use the tool. Your workflow is yours alone.

  • Zero telemetry or usage tracking
  • No analytics or behavior monitoring
  • No background network requests
  • Fully air-gappable architecture

Controlled Exceptions

The only network calls are ones you explicitly initiate: SAM.gov contract searches (public data) and optional Claude API for solicitation parsing. Both are opt-in and transparent.

  • SAM.gov API for public contract data
  • Optional Claude API for document parsing
  • User-initiated requests only
  • Full visibility into every network call

Have Security Questions?

We're happy to walk through our security architecture in detail. Book a call with our engineering team.

Contact Us