Deployment Options
Last Updated: June 3, 2025
At TejaSQL.ai, we understand that organizations have different security requirements and compliance needs. That's why we offer flexible deployment options to meet your specific requirements, from cloud-hosted to fully on-premises solutions.
All deployment options maintain our core data privacy promise: we never store or copy your data. Data is only processed in-memory during query execution, regardless of deployment model.
Cloud Deployment
Our standard offering provides enterprise-grade security with the convenience of a fully-managed solution.
Features:
- SOC 2 Compliant Infrastructure
Hosted on infrastructure that meets SOC 2 compliance standards for security, availability, and confidentiality.
- Regular Security Audits
Our systems undergo regular third-party security assessments and penetration testing.
- Automatic Updates
Always running the latest version with security patches and feature improvements.
- 24/7 Monitoring
Continuous system monitoring for availability and security.
- Enterprise SLA
Service level agreements with guaranteed uptime and support response times.
Best For:
Organizations that want a turnkey solution with minimal IT overhead while maintaining enterprise-grade security.
VPC Deployment
Deploy TejaSQL.ai within your own Virtual Private Cloud for enhanced isolation and control.
Features:
- Network Isolation
Run within your own VPC with your own network security policies.
- Private Connectivity
Connect to your internal systems without exposing data to the public internet.
- Custom Security Policies
Apply your organization's security policies and compliance controls.
- Identity Integration
Integrate with your existing identity provider (SSO).
- Managed Updates
We handle updates and maintenance within your security parameters.
Best For:
Enterprises with strict security requirements that need enhanced isolation while still benefiting from managed services.
On-Premises Deployment
Maximum control with full deployment within your own infrastructure, behind your firewall.
Features:
- Complete Data Sovereignty
All processing occurs within your own infrastructure with no data leaving your environment.
- Air-Gapped Option
Support for completely isolated environments with no internet connectivity.
- Hardware Control
Run on your own hardware with your specific security measures.
- Compliance Alignment
Align with your specific industry regulations and compliance requirements.
- Custom Integration
Deep integration with your existing security tools and monitoring systems.
Best For:
Organizations in highly regulated industries or with strict data sovereignty requirements that need complete control over their data environment.
Self-Hosted Option
For technical teams who prefer complete control over deployment and management.
Features:
- Docker Containers
Containerized deployment for easy setup and management.
- Kubernetes Support
Kubernetes manifests for orchestrated deployments.
- Detailed Documentation
Comprehensive setup and maintenance guides.
- Technical Support
Expert assistance during implementation and for ongoing maintenance.
- Update Control
Full control over when and how to update the system.
Best For:
Organizations with strong DevOps capabilities that want to integrate TejaSQL.ai into their existing infrastructure and deployment workflows.
Enterprise Security Assessment
We understand that enterprise customers often have unique security requirements. Our security team is available to work with your security and compliance teams to ensure that our solution meets your specific needs.
We can provide:
- Detailed security documentation
- Custom security assessments
- Compliance mapping to your industry standards
- Security architecture reviews
- Data processing agreements (DPAs)
This document was last updated on June 3, 2025. For any questions regarding our deployment options, please contact us at enterprise@tejasql.ai.