Powered by the AI models and data sources your pipeline depends on
How it works
The only platform that identifies opportunities before competitors react
From emerging signal to signed contract — Enki guides every step.
Features
Engage 3-6 Months before competitors
Enki Foresight™ detects emerging account pain across eight signal types and delivers a complete engagement strategy — so your reps act while competitors are still guessing.
Deal Workspace
Research without action is worthless. Deal Workspace is your war room.
Six tabs tell the story from thesis to close - with an AI sidebar that adaps to what you're working on
More features
Enki IQ is built to turn information into an unfair advantage
Deep Research
Powered by Gemini 3.1 Pro, BrightData, and Claude Opus 4.6 — Enki runs comprehensive analysis on any account, analyzing financials, tech stack, leadership, competitive positioning, and market dynamics.
Contact Intelligence
Multi-source enrichment combines Apollo.io, BrightData, and Gemini to build deep contact profiles. Every stakeholder gets a KDM score quantifying their decision-making authority — so your reps know exactly who matters.
AI Sales Assistant
Ask Enki anything about your accounts, contacts, or deals in natural language. Vector-powered RAG search across every piece of research, call note, and deal record finds exactly what you need in seconds.
Territory Command Center
A smart dashboard with today's priorities, quick access to accounts, contacts, opportunities, and tasks — plus tabbed intelligence panels for territory insights, pipeline health, and market news.
14 Point Signal Feed
Financial signals, hiring moves, tech stack changes, leadership shifts, competitive intel, regulatory shifts, and more — aggregated into a single chronological feed per deal.
PipeGen Outreach Engine
Weekly AI-generated outreach plans that prioritize accounts and contacts, draft personalized messages, and adapt to your pipeline in real time. Stop guessing who to call — let the AI rank it.
Enki FAQ
Frequently Asked Questions
How does Enki ensure the security and privacy of my data?
Enki is built security-first — privacy and data protection aren't features layered on top, they're foundational to how the platform is architected. Here's what that looks like in practice.
Authentication & Identity. Every API request is authenticated before any data is touched. Clerk manages all user sessions, and every Lambda function verifies identity independently — there is no anonymous access anywhere in the stack.
Data Isolation. Every record in Enki — your accounts, contacts, opportunities, research, MEDDPIC captures, Foresight theses, and all AI-generated content — is exclusively scoped to your user identity. Row-Level Security at the PostgreSQL layer enforces this at the database level, independent of application logic. Lambda functions apply a second layer of user-ID filtering on every query. Even your AI search results are isolated — Voyage AI vector embeddings are always user-scoped, so your semantic data never surfaces in another user's results.
Encryption. All data is encrypted at rest via AWS KMS on the Aurora cluster, and all secrets are encrypted in AWS Secrets Manager. Every data transfer across the stack — CloudFront to browser, API Gateway to Lambda, Lambda to Aurora, and all third-party AI API calls to Gemini, Claude, and Voyage AI — travels over HTTPS/TLS.
Network Security. The database has no public internet access. Aurora PostgreSQL runs inside a private AWS VPC, reachable only by explicitly authorized Lambda functions and ECS tasks. Frontend assets in S3 are accessible exclusively through CloudFront's Origin Access Control — never directly.
Least-Privilege Access. Four tightly scoped IAM roles ensure every Lambda function group has only the AWS permissions it needs — nothing more. Credentials are never hardcoded; all secrets are fetched at runtime from Secrets Manager.
Infrastructure Integrity. All infrastructure is managed through version-controlled CloudFormation templates, providing a full audit trail of every change and eliminating configuration drift. Deletion protection is enabled on all database resources, with retention policies that preserve data even if infrastructure stacks are modified.
Observability & Monitoring. Sentry monitors all 110+ Lambda functions with contextual error tagging for rapid anomaly detection. Datadog RUM tracks frontend behavior in real time. CloudWatch Logs retain 30 days of logs across all functions for audit and forensic review.
What measures does Enki take to ensure data encryption?
Encryption is applied at every layer of the Enki stack — not just the database, but every connection, credential, and data transfer across the entire platform.
Data at Rest. The Aurora PostgreSQL database cluster is fully encrypted at rest using AWS-managed KMS keys, covering all database files, automated backups, and snapshots.
Data in Transit. Aurora enforces SSL/TLS on all database connections. Lambda functions communicate with the database exclusively via the RDS Data API over HTTPS — raw, unencrypted TCP connections are never used.
Secrets & Credentials. Every API key, database password, and third-party token is stored in AWS Secrets Manager, which encrypts secret values at rest with KMS. Credentials are fetched securely at runtime by the shared authentication layer — they are never hardcoded, logged, or stored in environment variables.
Frontend Traffic. All application traffic is served through Amazon CloudFront over HTTPS/TLS. Static assets stored in S3 are only accessible via CloudFront's Origin Access Control — direct S3 access is blocked entirely.
API Layer. Every API Gateway endpoint is HTTPS-only. Clerk authentication tokens are transmitted exclusively over encrypted channels on every request.
AI & Vector Data. All calls to the Voyage AI embedding API — both sending text and receiving vector data — are made over HTTPS, ensuring your data is encrypted in transit even through the AI processing pipeline.
How does Enki IQ comply with international data protection regulations?
How does Enki comply with international data protection regulations?
Enki is built on a security-first architecture, and we are actively working toward formal compliance certifications to match the enterprise-grade protections already embedded in the platform.
SOC 2 Type II — In Progress. We are actively preparing for SOC 2 Type II certification. Our path to certification is accelerated by the fact that the majority of required controls are already in place — least-privilege IAM roles, per-user Row-Level Security at the database layer, AES-256 encryption at rest, TLS for all data in transit, secrets management exclusively through AWS Secrets Manager, CloudWatch audit logging across all 110+ Lambda functions, CI/CD review gates before every production deployment, and 24/7 security monitoring with defined incident response procedures. We run entirely on AWS, which itself maintains SOC 2 Type II certification — meaning we inherit AWS's physical security, network controls, and operational safeguards across all compute, storage, and database services.
GDPR Alignment. We are building toward full GDPR compliance for EU data subjects. We collect only the data necessary to deliver the service. Every record is scoped to the authenticated user — your data is never pooled with other customers. Upon account termination, users have a 30-day window to export their data before it is securely deleted. Data portability is available at any time. Data Processing Agreements (DPAs) are available for enterprise customers upon request.
CCPA Adherence. Enki adheres to California Consumer Privacy Act requirements, including the right to know what data is collected, the right to deletion, and the right to opt out of data selling. Enki IQ does not sell customer data — full stop.
Your Data Is Yours. You retain full ownership of all data in Enki IQ. None of your data is shared, sold, or used to train third-party AI models. All AI processing — Gemini Deep Research, Claude, and Voyage AI — is performed via paid API access where provider terms explicitly exclude customer data from model training.
Built on Certified Infrastructure. Every provider in the Enki stack maintains its own rigorous certifications:
AWS — SOC 2 Type II, ISO 27001, GDPR-ready
Clerk — SOC 2 Type II
Sentry — SOC 2 Type II
Anthropic (Claude) — SOC 2 Type II; does not train on customer data
Google (Gemini) — ISO 27001, SOC 2; does not train on paid API data
Voyage AI — API data not used for model training
What's Next. Our compliance roadmap includes completing our SOC 2 Type II audit, formalizing GDPR compliance with a dedicated Data Protection Officer, and evaluating ISO 27001 certification as we scale. We view compliance not as a checkbox but as an ongoing commitment — the security architecture is already enterprise-grade, and the formal certifications are the natural next step.
For compliance or security questions, reach out to our team at security@enkiq.ai.
Can I control who has access to my data within Enki?
Yes — and beyond access controls, Enki enforces strict data isolation by design. Your data isn't just hidden from other users; it's architecturally impossible for another user to access it.
Everything is yours alone. Every record in Enki — your accounts, contacts, opportunities, MEDDPIC captures, research outputs, Foresight theses, and pipeline data — is tied to your authenticated identity via a user-scoped foreign key. There is no shared data pool.
The database enforces it. PostgreSQL Row-Level Security policies ensure that every query is automatically filtered to your user ID. Even in the hypothetical scenario of an application bug, the database itself acts as a hard barrier against cross-user data access.
Then the application enforces it again. Every Lambda function independently filters by user ID on every query — a second layer of isolation that operates entirely separately from the database-level policies.
Your AI search is isolated too. The semantic search and AI assistant features are powered by vector embeddings that are scoped to your account. Your search results, research outputs, and AI-generated intelligence never mix with another user's data.
Every request is authenticated. Session tokens issued by Clerk are validated on every single API request. There is no anonymous access, no cross-session data bleed, and no unauthenticated endpoints.
What steps does Enki take to protect against data breaches?
Security isn't an afterthought at Enki — it's architectural. The platform is built with multiple independent layers of defense so that no single point of failure can expose your data.
Network Isolation. The database never touches the public internet. Aurora PostgreSQL runs inside a private AWS VPC, accessible only to authorized Lambda functions within designated security groups.
User Data Isolation. Every table containing user data enforces row-level security at the database layer — your data is cryptographically scoped to your account and cannot be queried by another user under any circumstances. All AI-generated vector embeddings follow the same rule: they are user-scoped and never shared across accounts.
Least-Privilege Access. Enki operates with four tightly scoped IAM roles — each internal service only has permission to do exactly what it needs to do, nothing more. Credentials are stored exclusively in AWS Secrets Manager, never in code or environment variables.
Authentication on Every Request. User authentication is handled by Clerk, with session tokens validated on every single API request through a shared authentication layer. There are no unprotected endpoints.
Encryption Throughout. All data is encrypted at rest on the Aurora cluster. All data in transit is encrypted via HTTPS/TLS across every endpoint and CloudFront distribution.
Continuous Monitoring. Sentry and Datadog run continuously across the stack, providing real-time error tracking, anomaly detection, and alerting on unexpected behavior.
Auditable Infrastructure. All five of Enki's CloudFormation stacks are version-controlled, meaning every infrastructure change is tracked, reviewable, and reproducible — eliminating configuration drift and maintaining a full audit trail.
How does Enki handle data backup and recovery?
Your data is protected by multiple layers of automated backup and recovery infrastructure. Enki's database runs on AWS Aurora PostgreSQL Serverless v2 with daily automated backups and a 7-day retention window, giving you point-in-time recovery down to the second — so in the unlikely event of an issue, we can restore to virtually any moment within that window.
The database cluster has deletion protection enabled, meaning it cannot be accidentally removed via the console or API. On top of that, our infrastructure is configured with retention policies that preserve the database cluster, instance, and subnet group even if the underlying infrastructure stack is modified — an extra safeguard against accidental data loss.
All data is encrypted at rest on the Aurora cluster, and frontend assets are stored redundantly on AWS S3 with CloudFront distribution. Our entire infrastructure is codified in version-controlled CloudFormation templates, meaning a full environment reconstruction is repeatable and auditable at any time.





