Deploy Peridot in enterprise environments with a secure, scalable architecture. Understand control and data plane separation, cloud support, BYOK model access, and data handling boundaries.
This section is critical for infrastructure, & security
OverviewPeridot is designed to meet enterprise security and compliance requirements by providing visibility, control, and auditability across all AI usage.Core Security CapabilitiesCentralized policy enforcementFull audit loggingRole-based access controlD ...
OverviewPeridot uses a dual-plane architecture that separates governance from execution.The control plane manages policies, routing, and auditability, while the data plane handles AI requests and data processing within your environment.Why This Architectu ...
OverviewPeridot is deployed using a hybrid architecture that separates the control plane from the data plane.This design ensures that governance and control are centralized, while data processing remains within the customer’s environment.Architecture Over ...
OverviewPeridot supports multiple environments to separate development, testing, and production systems.This ensures safe deployment and controlled experimentation.Environment TypesDevelopmentStagingProductionWhy Environments MatterPrevent unintended prod ...
OverviewPeridot supports Bring Your Own Key (BYOK) for all model providers.This ensures that your organization maintains full control over model access, credentials, and usage.Why BYOK MattersWithout BYOK:Model access is sharedCredentials may be exposedUs ...
OverviewPeridot is designed to ensure that sensitive data remains within your environment and is handled according to your organization’s policies.Key PrinciplesData stays in your environmentNo unnecessary data storagePolicy-based data controlFull visibil ...