More secure than any cloud.

Risks in Cloud Based Training


You have to transfer all your data to one or more instances

You need you to secure each instance

You need to worry about security of both your data and your model during the DevOps process

Security Benefits of Swarm based Training

Your data and model stay in our private environment

Only tensors are sent for training

All data is encrypted during transit and when at rest

SwarmOne developed an “instance-less” technology, that runs on swarms of GPUs. It enables companies to run AI model training, dynamically and seamlessly, without ever caring about Cloud instances in public Clouds.

Security at SwarmOne

Security at SwarmOne

Our Commitment to Security

At SwarmOne, we prioritize the security of our systems and the protection of your data. We understand the importance of trust in our technology and services. Our dedicated security team is committed to providing a secure and reliable environment for all our users and customers.

Secure by design

SwarmOne allows you to work from your own environment, you work on your training code, and all the engineering is abstracted away, we seamlessly handle the technical complexities – and the security.

There’s no need for you to worry about mounting buckets, granting permissions, or opening ports—it’s all magic, taken care of for you.

Application Security

● Software dependencies are audited by Github’s Dependabot.

● We use HTTPS for secure connections. HTTPS is forced for all services using TLS (SSL), including our public website, Dashboard and APIs to ensure secure connections.

● All public SwarmOne APIs use TLS 1.3, the latest and safest version of the TLS protocol.

● Internal code reviews are performed using a modern, PR-based development workflow (Github), and engage external penetration testing firms to assess our software security.

● We have automated synthetic monitoring test applications that continuously check for network and application isolation within our runtime.

● All data transmitted to and from SwarmOne is encrypted using industry-standard protocols. We ensure that sensitive data stored in our databases is encrypted at rest, safeguarding your information from unauthorized access.

Corporate Security

All SwarmOne employees have secure access to the company infrastructure.

● Access to our services and applications is gated on a SSO Identity Provider (IdP).

● We mandate phishing-resistant multi-factor authentication (MFA) in all enrolled IdP accounts.

● We regularly audit access to internal systems.

Infrastructure Security

SwarmOne ensuring a hardened, minimal attack surface for components we deploy on our network.

● SwarmOne implements strict network monitoring and protection with firewalls, IDS, and IPS to secure against unauthorized access and attacks.

● We enforces access control with RBAC to restrict network and data access based on user roles, ensuring access is job-specific.

● SwarmOne uses logging and metrics observability providers, including Datadog and

● We conduct annual business continuity and security incident exercises.

Continuous Improvement and Vulnerability Remediation

Security at SwarmOne is an ongoing effort. We continuously monitor our systems for vulnerabilities and apply updates and patches promptly. Our security team stays abreast of the latest security research and trends to enhance our defenses.

SOC 2 Certified

SwarmOne is also SOC2 Type 2 certified, meaning we provide security certification to our customers and actively monitor and patch any security weaknesses.


For any security concerns or inquiries, please contact our security team at Your privacy and security are of utmost importance to us, and we are here to address any questions or concerns you may have.