Security That's Non-Negotiable
Your bid data is your competitive advantage. FCIS was architected from day one to ensure it never leaves your machine.
Security at a Glance
Numbers that speak for themselves.
Four Pillars of Protection
Every layer designed to keep your data where it belongs.
Local Processing
All AI inference runs on your machine via Ollama at localhost:11434. Your bid data, cost models, and competitive intelligence never leave your hardware. No cloud. No middleman.
- Ollama with Llama 3.1 8B runs locally
- GPU-accelerated inference on your hardware
- No data transmitted to external AI services
- Full offline capability for analysis
Encrypted Storage
Your knowledge base and analysis results are stored with SHA-256 hashing and protected behind a PIN. Even if someone accesses your files, they can't read your data.
- SHA-256 cryptographic hashing
- PIN-protected application access
- Encrypted SQLite database
- Secure local file storage
Network Isolation
FCIS sends zero telemetry, zero analytics, and zero usage data. We don't track what you search, what you bid on, or how you use the tool. Your workflow is yours alone.
- Zero telemetry or usage tracking
- No analytics or behavior monitoring
- No background network requests
- Fully air-gappable architecture
Controlled Exceptions
The only network calls are ones you explicitly initiate: SAM.gov contract searches (public data) and optional Claude API for solicitation parsing. Both are opt-in and transparent.
- SAM.gov API for public contract data
- Optional Claude API for document parsing
- User-initiated requests only
- Full visibility into every network call
Have Security Questions?
We're happy to walk through our security architecture in detail. Book a call with our engineering team.
Contact Us