Every layer of NudgeX is designed to protect your data and keep outreach under your control. No afterthoughts. No shortcuts.
Every request passes through each layer. No shortcuts. No bypasses.
These are architectural decisions, not configuration options. They can't be toggled off.
No message leaves your workspace without an explicit click. The AI drafts and recommends — your team reviews and decides. This is by design, not a temporary limitation.
All sensitive credentials are encrypted using 256-bit AES — the same standard used by financial institutions. Each token is individually secured with unique keys that are never stored alongside your data.
Every query and API call is scoped to your workspace at the infrastructure level. This isn't a software toggle — it's a structural boundary. No misconfiguration can expose your data to another customer.
Tone presets, restricted phrases, and follow-up frequency limits are enforced automatically on every draft — whether generated by AI or edited by your team. Rules are checked server-side before any message can be sent.
NudgeX never sees or stores your email password. We connect through your provider's official authorization system with read and send permissions only. Revoke access anytime from your email settings.
Every draft, edit, approval, send, and schedule is recorded with timestamps and context. The log is append-only — entries cannot be modified or removed, giving your compliance team a reliable audit trail.
These aren't aspirations. They're constraints we build around.
Every outbound message requires a human click. No scheduling without approval. No batching without review. Your team stays in full control.
NudgeX reads your email threads to surface follow-ups. Nothing more. Your data is never used for model training or behavioral profiling.
Every recommendation shows why: why this thread, why now, why this priority. Your team always understands the reasoning behind each suggestion.
We connect to your inbox through your email provider's official authorization. No passwords stored. Fully revocable from your provider's settings.
For security teams and technical reviewers — here's what's under the hood.
Five security layers. Human approval on every send. Complete audit trail. Start following up with confidence.