Portkey provides three enterprise deployment models with identical feature parity. This page explains the security posture, data flows, and shared-responsibility boundaries for each model—so InfoSec teams can assess risk quickly and choose confidently.

Security Comparison (at a glance)

ControlSaaS EnterpriseHybrid (Recommended)Airgapped
Data residencyRuntime in region of choice; customer data stored in region-specific shards (e.g., EU)All data (requests, responses, logs) stays in your VPC/on‑prem; control-plane metrics region is customer’s choiceFully offline; all data stays inside isolated network
Runtime data pathRequests hit nearest regional edge gateway (e.g., EU only when EU is chosen)Gateway runs inside your network; model calls stay localGateway and model calls run entirely offline
Control‑plane metadataMinimal operational metadata in Portkey control planeMetrics are always sent to Portkey ClickHouse; ClickHouse region can be customer’s choice; IP/URL redaction supportedNone (no outbound traffic)
Logs & retentionLogs 90 days; metrics 365 days by default; zero‑retention available; PII scrubbing and “metrics‑only” mode supportedLogs in customer S3 or any S3‑compatible store; IRM/lifecycle policies; native export to SIEM/observabilitySame as Hybrid, fully offline
Secrets & KMSProvider keys in Portkey vault (envelope encryption) with KMS support; BYOKBYOK; integrate with AWS KMS/Azure Key Vault/GCP KMSBYOK; same KMS integrations offline
Identity & accessSSO (SAML/OIDC), SCIM, fine‑grained RBACSame; plus local gateway RBACSame; plus local gateway RBAC
EgressTo Portkey control plane and model providers in chosen region(s)To Portkey control‑plane public APIs and container registry; data‑plane↔control‑plane over Internet or private tunnel/peeringNone (no outbound calls required)
Subprocessors exposureYes (published list and notifications)Minimal (control‑plane only)None
Supply chainSigned images, SBOMs, standard vulnerability SLAsSameSame
BCP/DRPublished RTO/RPO; multi‑AZ/region architectureCustomer‑owned backups/DR; Portkey provides guidance and toolingCustomer‑owned backups/DR, offline procedures
Feature parityFullFullFull

What leaves your environment?

  • SaaS: Runtime traffic remains in the selected region. Minimal control‑plane metadata is stored centrally; customer data (logs/metrics) retained per policy (90/365 by default) with zero‑retention and PII scrubbing options.
  • Hybrid: Application data, prompts, responses, and logs stay entirely in your VPC/on‑prem. Metrics are always emitted to Portkey’s control plane (ClickHouse) and can be hosted in your region of choice. IP/URL redaction supported.
  • Air‑gapped: No outbound network calls for any purpose (including licensing and updates). All data remains inside the isolated environment.

Data flows (per model)

SaaS Enterprise

  • Control plane is centrally hosted (no customer data resides here).
  • AI Gateway is deployed on regional edge; requests are served in the chosen region (e.g., EU‑only when EU is selected).
  • Persistent data stores (logs, metrics) are created in the customer’s chosen region (e.g., separate EU shards for enterprise customers).

Hybrid (Recommended)

  • Gateway runs inside your VPC/on‑prem; prompts, responses, and logs never leave your environment.
  • Operational metrics are always sent to Portkey’s control plane (ClickHouse); the ClickHouse DB can be hosted in your region of choice.
  • IP and URL redaction supported; data‑plane↔control‑plane connectivity can be Internet or private tunnel/VPC peering.

Air‑gapped

  • Fully disconnected deployment—no outbound traffic required for licensing or updates.
  • Container images are delivered via private registry or offline media; updates applied offline on your schedule.

Common security questions

Shared responsibility

AreaSaaS EnterpriseHybridAir‑gapped
Data storage & residencyPortkey implements region pinning; you set retentionYou own storage, residency, and lifecycleYou own storage, residency, offline lifecycle
Metrics & telemetryPortkey stores minimal metadata and metrics per policyMetrics always sent to Portkey control plane; redaction supportedNone
Secrets & KMSPortkey vault with KMS supportCustomer KMS integrationsCustomer KMS integrations
Identity & RBACSSO/SCIM/RBAC in SaaS consoleSSO/SCIM + local gateway RBACSSO/SCIM + local gateway RBAC
Patching & CVEsPortkey SLAsPortkey supplies signed images/SBOM; you apply updatesSame, offline process
Backups & DRPortkey managedCustomer managed (guidance provided)Customer managed (offline)

Why Hybrid is usually the right choice

Data stays put

Keep prompts, responses, and logs in your VPC/on‑prem while still benefiting from a managed control plane.

Enterprise velocity

Teams reach production faster, adopt the platform broadly, and realize value sooner—without compromising security controls.

Operational safety

Avoid the patch debt and stagnation risk common in fully offline stacks while maintaining strict network boundaries and redaction.

References