NewAxiom
Security
How we handle data and access during early access.
Security
Simple, transparent, and invite-only
Invite-only access
The app is gated. We onboard a small set of customers and control access tightly during early access.
Data handling
Your files are used to run pricing and quoting. We aim to keep retention minimal and explicit.
Operational controls
Environment variables and service permissions are managed per deployment.
Want a security rundown?
We can walk through our current controls and planned improvements, including audit logging and stricter roles.
Want a quick walkthrough?
We’ll show you the flow: import costs → apply rules → export pricing.