How we approach security at Drumee
Encryption, key management, audit trails, and the SOC 2 timeline — all in one place.

Drumee security architecture diagram
Encryption posture
Every blob is AES-256 encrypted at rest. Keys are scoped per-workspace and rotated every 90 days.
Audit trails
Every file open, share, and permission change writes a tamper-evident log entry. Admins can stream these to their SIEM via webhook.
Keep reading

Product1 min
Bringing AI search to your private workspace
Embeddings on your own data, retrieval that respects ACLs, and zero leakage to third-party LLMs.

Engineering1 min
Sub-100ms file open: how we rebuilt the storage layer
A walkthrough of the edge cache, content-addressed storage, and zero-copy stream that brought open latency under 100ms p95.

Industry1 min
Why we are betting on the post-cloud workspace
The era of stitching SaaS tools together is ending. Here is the architecture we believe will replace it.