AI Models & Trust Center

Model intelligence, access controls, and compliance evidence in one place.

TrustAIQ gives enterprise buyers, security teams, compliance officers, and AI governance stakeholders a clear view of supported AI models, account controls, deployment posture, and trust documentation.

Supported AI models

Latest providers, deployment modes, and buyer-fit signals

Search/filter ready catalog

OpenAI

GPT-5.5, GPT-4o, o-series

High ready

Use cases: Multimodal workflows, agent tasks, enterprise apps

Capability: Fast multimodal + strong reasoning

Deployment: Hosted API

Residency: Regional controls by plan

API: Available

Anthropic

Claude Sonnet, Claude Opus

High ready

Use cases: Long-context analysis, policy review, writing

Capability: Deep reasoning + careful instruction following

Deployment: Hosted API

Residency: Enterprise controls

API: Available

Google

Gemini family

High ready

Use cases: Search-grounded analysis, multimodal content

Capability: High context + broad media support

Deployment: Hosted API

Residency: Cloud-region aligned

API: Available

Meta

Llama family

Medium-high ready

Use cases: Self-hosted AI, private inference, custom tuning

Capability: Flexible open-weight deployment

Deployment: Hosted or self-hosted

Residency: Customer controlled

API: Provider dependent

Mistral

Mistral Large, Mixtral, open models

High ready

Use cases: EU-aligned AI, efficient inference, private apps

Capability: Strong speed-to-cost profile

Deployment: Hosted or self-hosted

Residency: EU-friendly options

API: Available

Open-source / self-hosted

Qwen, DeepSeek, Cohere, custom models

Varies ready

Use cases: Sovereign AI, restricted data, internal tooling

Capability: Configurable speed, cost, and control

Deployment: Self-hosted

Residency: Customer controlled

API: Custom gateway

Designed for model governance

Compare hosted and self-hosted model families by use case, context size, API posture, data residency, speed, and reasoning depth before teams standardize on an AI platform.

Dynamic model catalog
CMS-friendly provider records
Search and filter taxonomy
Future benchmark and pricing fields

Individual access

Free

Models: Core hosted catalog

Usage: Light daily usage

Context: Standard

Basic reports
Export summary
Community updates

Individual higher-usage access

Pro

Models: Expanded hosted models

Usage: Higher monthly usage

Context: Extended

Expanded model access
Higher usage limits
Longer context windows

Security and governance teams

Enterprise

Models: Hosted + approved model catalog

Usage: Contracted throughput

Context: Large context workflows

SSO/SAML
RBAC
Audit logging
API access

Financial, healthcare, government

Regulated Enterprise

Models: Private and residency-aware deployments

Usage: Dedicated capacity

Context: Custom context policy

Private deployment
Tenant isolation
Zero retention options
Dedicated infrastructure

Security & Compliance

A trust portal for AI governance reviews

Give security, legal, procurement, and compliance stakeholders a modern portal for reviewing controls, model policies, risk evidence, and enterprise AI governance posture.

SOC 2 Type II
ISO 27001
GDPR readiness
Encryption at rest and in transit
Zero data retention options
Tenant isolation
MFA / SSO
RBAC and access controls
Vulnerability management
Penetration testing
Secure API architecture
Human review policies

Portal documentation

Expandable evidence cards

Dark and light mode ready
Data handling practices+

Document how submitted content is processed, retained, redacted, routed, and converted into trust evidence across website, document, image, video, and text workflows.

Model training policies+

Separate customer-submitted content from model improvement workflows, show zero-retention options, and expose model-family analysis as probabilistic forensic classification.

Privacy commitments+

Publish clear policies for encryption, access controls, regional processing, tenant boundaries, data minimization, and customer-controlled deletion.

Incident response+

Maintain severity tiers, response ownership, notification timelines, evidence preservation, remediation tracking, and post-incident review procedures.

Vendor risk management+

Give procurement and compliance teams a single place to review subprocessors, model providers, deployment modes, retention posture, and audit documentation.