When you hand business-critical processes to an AI, you need to know it's secure, and you need to be able to see exactly what it did. Bex is built on secure cloud infrastructure with a unique advantage: because everything it does is conducted over email, you get a complete, tamper-proof audit trail by default.
Jump to:
Secure infrastructure
harmonic mean runs Bex on enterprise-grade cloud infrastructure with industry-standard protections: encryption in transit and at rest, network isolation, regular security audits, and strict access controls on our side. When Bex communicates with your systems of record (Procore, Autodesk Construction Cloud, ProjectSight, and others), it does so through the same authenticated APIs those platforms provide to any enterprise integration. No special network configurations, no VPN tunnels, no open ports on your side. Your IT team's existing security posture stays intact.
Bex's foundation is built on the Microsoft Azure cloud platform, the gold standard for enterprise security and reliability.
Data is never used to train AIs and never shared with any third party.
Observability through email
This is where Bex's architecture gives you something most AI tools can't: complete visibility into every action it takes.
Because Bex operates through email, every interaction is automatically recorded in your organization's email system. Every document Bex receives, every approval request it sends, every response from a reviewer, and every confirmation of data committed to your system of record lives in an email thread that your team can search, review, and archive using the tools they already have.
There's no separate audit log to consult, no proprietary dashboard to learn, and no vendor lock-in on your compliance data. If a question ever arises about what Bex did with a particular document, the answer is sitting in your inbox. Your compliance and legal teams can verify Bex's actions using the same email discovery tools they use for everything else.
For organizations in regulated industries or those subject to audits, this kind of built-in traceability is invaluable, and it comes at no extra effort.
Minimal data retention
AI systems that store large volumes of customer data create risk. The more data that sits in a vendor's environment, the larger the potential impact of a breach.
Bex is designed to minimize this exposure. Because the email trail lives in your organization's email infrastructure (not ours), Bex doesn't need to maintain long-term copies of your documents or extracted data. It processes what it receives, commits the results to your system of record, and moves on.
This approach reduces harmonic mean's data footprint significantly compared to platforms that centralize your information in their own databases. Your data stays in systems you control, letting us enforce aggressive data deletion policies—by default, Bex never retains proprietary data longer than 30 days.
As noted above, data is never used to train AI models, and will never be shared with any third party.
Low-effort access control
As we discuss in our integration article, Bex's email-based architecture provides natural access control. Only emails from your organization's authorized domains can trigger data creation. There are no Bex-specific user accounts or credentials to manage, which eliminates an entire category of security risk (password reuse, credential stuffing, forgotten deprovisioning).
When a team member leaves your organization and their email account is deactivated, their ability to interact with Bex ends immediately. No offboarding ticket required.
Hallucinations and jailbreaking
All LLMs can make mistakes, but Harmonic Mean has developed proprietary, multilayer safeguards against hallucination (confident mistakes) and jailbreaking (end-user attempts to thwart guardrails). The open audit trail of email means you'll never wonder what Bex said, and when it comes to the why, our dedicated customer success management team will be with you every step of the way, monitoring and tweaking to ensure the best results.
Conclusion
As an email-based system, Bex is inherently observable in a way that standard applications can't be, gives you an audit trail you can see. Built atop Microsoft Azure, it follows enterprise-level security practices. And an aggressive, configurable data retention policy means Bex doesn't need to store your proprietary data for long.