The security your legal team will actually approve
Three of our seven pillars exist because enterprise hiring requires enterprise security. 9-layer identity verification on every applicant. Immutable audit trails on every decision. Zero demographic data in the scoring model. This is not a checkbox on a vendor form. It is how the platform was built from the first line of code.
Four security pillars. Each one deep enough to be its own product.
Most platforms bolt on security features after a customer asks. We built ours before we wrote the first feature.
9-Layer Trust Gate
Every applicant passes through a 9-layer identity verification system: IP geolocation, impossible travel detection, multi-account analysis, VPN/proxy/Tor blocking, government ID, selfie matching, document review, email domain analysis, and location consistency.
- Government ID + selfie match
- Impossible travel detection
- VPN/proxy/Tor blocking
Fraud Prevention
The Trust Gate assigns verification scores from 0-100, with tiered levels from Unverified through Premium. Suspicious activity triggers real-time alerts and can block applications before they reach your pipeline.
- 0-100 verification score
- Tiered verification levels
- Real-time fraud alerts
Objective Semantic Evaluation
Zero demographic data enters the scoring model. Agent Genie evaluates candidates based purely on qualifications, experience, and fit against job requirements, ensuring consistency and eliminating bias.
- Zero demographic bias
- Consistent cross-recruiter scoring
- EEOC/OFCCP aligned
Decision Governance
Every evaluation, stage movement, and hiring decision is logged in an immutable audit trail. AI assists but never makes autonomous decisions. Transparent scoring with complete explainability.
- Immutable audit trails
- AI-assisted, human-controlled
- Complete explainability
Infrastructure your IT team will recognize
Same cloud, same encryption, same access controls as the systems your team already trusts.
Enterprise Infrastructure
Hosted on enterprise-grade cloud infrastructure with 99.99% uptime SLA
End-to-End Encryption
All data encrypted in transit (TLS 1.3) and at rest (AES-256)
Access Controls
Role-based permissions with SSO, MFA, and audit logging
Data Residency
Choose where your data is stored to meet regulatory requirements
Security tailored to your needs
Different organizations have different security requirements. We adapt to yours.
For Enterprise Organizations
Meet the strictest compliance and security requirements
- Dedicated security reviews and documentation
- Custom data retention policies
- On-premise deployment options
- 24/7 security monitoring
For Staffing Agencies
Protect your reputation and your clients' data
- Multi-tenant data isolation
- Client-specific security policies
- Audit reports for each client
- Compliance documentation on demand
Common vendor risk questions
Answers your IT and compliance teams need during vendor evaluation.
How does Agent Genie make evaluations?
Agent Genie reads the full candidate profile and full job description, then dynamically generates a contextual evaluation with a 0-100 score and written assessment. Every score is fully explainable with a complete audit trail.
What is the Trust Gate?
A 9-layer identity verification system. Layers include IP geolocation, impossible travel detection, multi-account analysis, VPN/proxy/Tor blocking, government ID, selfie match, document review, email domain analysis, and location consistency.
Can we audit every AI decision?
Yes. Decision governance ensures every evaluation, stage movement, and hiring action has an immutable audit trail. Activity logging captures all user actions and AI outputs.
Does AI replace human decision-making?
Never. Pillar 1 is AI-Assisted, Human-Controlled Decisions. AI empowers your team with evaluations, coaching, and analysis, but every hiring decision stays with humans.
How do you prevent bias?
Zero demographic data enters the scoring model. Agent Genie evaluates purely on qualifications and job fit. Strict guardrails and regular audits ensure consistent, objective outcomes.
What about SSO and access controls?
SAML/OIDC SSO, role-based permissions, IP allowlisting, and MFA support. Enterprise access control is built in, not bolted on.
Certifications & Compliance
Kreativs meets the highest standards for security, privacy, and compliance.
SOC 2 Type II
Security, availability, and confidentiality
ISO 27001
Information security management
GDPR Compliant
EU data protection standards
CCPA Compliant
California privacy requirements
See It With Your Own Data
Bring your hardest role. See Agent Genie evaluate your candidates.
No canned demos. We run your actual job descriptions and candidate data through our semantic evaluation, so you can see objective, bias-free scoring with complete audit trails before you commit.