
We take security very seriously
Candle AI technical team comes from the FAANG companies who have built the most secure and private applications, at scale. We prioritize data privacy and security, ensuring that no information from your email accounts is stored, shared, or sold. Our AI-powered email assistant is designed specifically for legal teams, using email content solely to generate more precise responses.

Emails are drafted, never sent
We understand that your emails need to be reviewed before sending out. It's only drafted and not sent out until you press the Send button.

Secure Cloud Architecture
Our back-end infrastructure is provided by leading cloud providers and is secured with rigorous access controls, change management, and privacy safeguards. To ensure data privacy and integrity, all data is end-to-end encrypted.

SOC 2 Type II - Coming Soon
We are on track to get SOC 2 certified in Q3 2025. Please reach out to the security team for further information.