Powerful Features for Enterprise AI

Everything you need to turn your organization's knowledge into an intelligent, searchable resource.

AI Chat with RAG

Ask questions in natural language and get accurate, source-cited answers. CLAIM uses a sophisticated RAG pipeline combining vector similarity search, BM25 full-text search, and cross-encoder reranking for the most relevant results.

  • Hybrid search (vector + BM25)
  • Cross-encoder reranking
  • Streaming responses via SSE
  • Source citations in every answer
  • Contextual retrieval with chunk summaries

Text-to-SQL

Query structured data using natural language. Upload CSV files or connect external databases via Trino, then ask questions as if talking to a colleague.

  • Natural language to SQL conversion
  • CSV file support
  • External database connections via Trino
  • Analytical queries with tabular results
  • Schema-aware query generation

Document Processing

Ingest documents in 15+ formats with automatic text extraction, language detection, and intelligent chunking. Support for 29 languages out of the box.

  • PDF, DOCX, XLSX, PPTX, HTML, MD, and more
  • Text extraction engine
  • 29-language automatic detection
  • Intelligent paragraph-based chunking
  • Contextual summaries per chunk

Multi-Tenancy

Isolated workspaces with granular role-based access control. Each workspace has its own documents, data sources, and AI configurations.

  • Workspace-scoped data isolation
  • RBAC: Admin, Manager, Maintainer, User
  • LDAP / Active Directory integration
  • Automatic user and group sync
  • Per-workspace AI model configuration

AI Provider Flexibility

Choose your AI provider: run models locally with Ollama for complete air-gapped operation, or connect to OpenAI or Google Gemini for cloud-powered intelligence.

  • Ollama for local, air-gapped AI
  • OpenAI integration
  • Google Gemini integration
  • 11 configurable model roles per workspace
  • Dynamic provider switching

Security, Compliance & Auditability

Enterprise-grade security with complete audit trails for every user interaction, field-level encryption, TLS certificate management, and on-premises data sovereignty — built for compliance with data privacy regulations.

  • Full audit trail for every query and response
  • Field-level encryption at rest
  • TLS certificate management (PEM/JKS)
  • On-premises data sovereignty
  • No external API exposure by default

Ready to get started?