Enterprise Options

Self-hosted deployments, SSO, audit logs, and SLAs. Proliferate fits into your security posture, not the other way around.

Contact us

Autonomous bug resolution

Sentry alert
Sentry alert
Analyzing error…Deploying fix…Tests passing
Your VPCIsolatedAudited

PR #847 opened

auth token refresh fix

Self-hosted deployment

Deploy on your own cloud or on-prem. Docker, Kubernetes, or bare-metal. Your data never leaves your environment.

SSO & access control

SAML 2.0 and OIDC with any identity provider. SCIM for automated provisioning. Role-based access control with granular permissions.

Data isolation

Full network isolation, encrypted at rest and in transit, no external calls. Air-gap capable for regulated environments.

Scoped code access

Proliferate only touches repositories you explicitly allow. Self-hosted deployments keep everything on your infrastructure with full audit trails.

Compliance ready

SOC 2 Type II in progress. Data residency across all major cloud regions. BAA available for healthcare workloads.

Dedicated support

Named account engineer, private Slack channel, sub-1-hour priority response, custom SLAs, and hands-on onboarding.

Talk to our team

Tell us about your infrastructure, compliance needs, and team size. We'll put together a plan that fits.

Frequently asked questions

Yes. Proliferate can be deployed entirely on your own infrastructure. We support Docker, Kubernetes, and bare-metal environments with full air-gap capability.

SOC 2 Type II certification is in progress. We support data residency requirements across all major cloud regions and can sign BAAs for healthcare workloads.

We support SAML 2.0 and OIDC with any identity provider including Okta, Azure AD, and Google Workspace. SCIM is available for automated user provisioning and deprovisioning.

You get a dedicated engineer for setup, integration review, and team training. Most teams are fully onboarded in 1–2 weeks depending on the complexity of your stack.

Only with explicit, scoped permission. Self-hosted deployments keep everything on your infrastructure. Cloud deployments use encrypted, ephemeral access with full audit trails.

Custom uptime guarantees, priority support with sub-1-hour response time, a dedicated Slack channel, and named account management. We tailor SLAs to your requirements.

Ready to take control?

Proliferate