Skip to content
Qrendo

Benefits · Security & sovereignty

Your requirements — your cloud, your country, your control

Requirement data can be classified, commercially sensitive, security-critical, or indirectly personal. Qrendo req:ai is built for organisations where a generic SaaS deployment is not enough. The platform can run in a controlled European or country-specific cloud environment — or on-premise for customers with higher security and sovereignty requirements.

Benefits · Security & sovereignty — illustration

Today's risks

Sensitive requirement data leaves your control: Requirements, risks, incidents, and verification evidence may reveal business-critical processes, system weaknesses, supplier dependencies, or security-sensitive information.

Foreign cloud dependency creates sovereignty risk: Using global cloud and AI services can introduce uncertainty around data location, legal jurisdiction, subprocessors, and long-term strategic control.

Generic SaaS does not fit every security model: Some organisations require on-premise deployment, national data residency, dedicated infrastructure, or strict separation from other customers.

Weak access control increases operational risk: Shared documents and broad permissions make it harder to prevent accidental edits, unauthorised access, uncontrolled exports, and unclear accountability.

How Qrendo req:ai addresses it

Deployment options for European, national, or on-premise control

Qrendo req:ai can run in Europe, in a specific country where required, or on-premise for customers with stricter security needs. This gives organisations control over where requirement data is stored, processed, and operated.

On-prem ready

Dedicated customer environments

Each customer can run in a fully separated environment, not as part of a shared multi-tenant platform. Data, users, and configuration are isolated per installation.

Customer isolation

Role-based access control (RBAC)

Project permissions are built as named permission groups per project — admin-defined packages covering read, export, import, review, finalize, change management, V&V, AI analysis, and more. Least privilege becomes operational, not just on paper.

RBAC

Classification levels per project

Project classification levels can be assigned to requirements, sources, imports, and risks, so labelling follows the same taxonomy across the entire requirements base.

Classification levels

Audit trail and logged API access

Per-entity changelog supports audit responses and governance reporting. API tokens log usage, important for tool-chain integrations without spreading credentials.

Audit trail

Concrete outcomes

A clear data-sovereignty story for procurement: you can specify where data is stored and processed.

Fewer accidental changes and access incidents thanks to granular, role-based permissions.

Evidence for audits and governance: every change is logged with user, timestamp, and context.

Air-gap and migration support: export projects as structured ZIP archives and reimport to isolated environments.

See how it works