TERMS

Clear, transparent terms that reflect our commitment to trust, security, and partnership in threat detection.

Effective: November 1, 2025Last updated: November 1, 2025

Overview

RubiLabs is committed to transparency in everything we do. These Terms of Service outline our mutual agreement as we work together to discover the invisible threats in your systems and data.

Break the Silos

Turn disconnected data into a single language of understanding.

Discover the Invisible

Find hidden patterns and anomalies buried in noise.

Trusted by Design

Every action and insight is traceable, auditable, and explainable.

Our Services

RubiLabs provides real-time threat detection and response capabilities designed to adapt faster than evolving threats.

LAPIS

Analyze. Understand. Act.

Lapis turns complexity into clarity by uncovering relationships, detecting anomalies, and predicting risks hidden inside your data. From compliance to operations, Lapis drives faster, smarter, and more confident decisions.

Professional Services

Expert consultation, implementation, and optimization services to maximize your security investment.

Support & Training

24/7 technical support and comprehensive training programs to ensure your team maximizes platform capabilities.

Your Responsibilities

Effective threat detection requires partnership. Here's what we need from you to deploy fast and adapt faster:

Accurate Information

Provide accurate account information, network configurations, and threat intelligence data to ensure optimal platform performance.

Authorized Access

Only connect systems and data that you own or have explicit authorization to monitor for security threats.

Security Hygiene

Maintain strong authentication practices, regularly update access credentials, and promptly report suspected security incidents.

Data & Privacy

Your data security and privacy are fundamental to our trusted by design approach. We implement comprehensive safeguards at every level.

Data Processing Principles

  • Purpose limitation: Data is processed solely for threat detection and security analysis
  • Data Minimization: We collect only data necessary for effective threat identification
  • Retention Limits: Data is retained only as long as required for security purposes
  • Access Controls: Strict role-based access with full audit trails

Compliance

RubiLabs maintains compliance with global security and privacy standards, ensuring our platform meets enterprise regulatory requirements.

SOC 2
ISO 27001
GDPR
FedRAMP

Security

Security isn't just what we provide—it's how we operate. Our infrastructure and processes are designed to protect against the very threats we help you detect.

Infrastructure Security

Zero-trust architecture with continuous monitoring and automated threat response.

  • Multi-factor authentication required
  • Network segmentation and micro-perimeters
  • Real-time anomaly detection
  • Regular penetration testing

Incident Response

24/7 security operations with automated detection and rapid response.

  • Detection: < 5 minutes
  • Response: < 15 minutes
  • Notification: < 1 hour

Questions About These Terms?

We believe in transparency and open communication. If you have questions about these terms, we're here to help.