Agent

One agent. Every customer moment.

The customer-facing side of Unless — one AI Customer Agent across acquisition, retention, expansion, and support, with the Help Center it auto-generates as its public face. Browse a moment, or see the full overview.

Acquisition

Qualify, convert, educate. 24/7 on your marketing site.

Retention

See churn coming. Act before it does, inside the customer's product.

Expansion

Catch upsell signals early. Route them to the right owner.

Support

Resolve, co-pilot, learn — across every helpdesk and channel.

Engine

The platform underneath.

The back-of-house side of Unless — a Living Knowledge library that maintains itself, plus the Train → Test → Deploy → Analyze loop that keeps every Customer Agent sharper after every conversation. See how the engine compounds.

Train

Always current. Always ready. Living Knowledge + Living Context.

Test

Before a customer sees it. Preview, simulate, audit.

Deploy

One agent. The whole journey. Memory across all of it.

Analyze

Performance, value, AI maturity. All visible. All live.

Trust

Built for the EU from day one

The architecture that lets your DPO, security, and procurement teams sign off without slowing your team down. Browse the page, or jump straight to a section.

Privacy Vault

Twelve numbered measures keep sensitive identifiers home.

Compliance posture

Three pillars — sovereignty, AI Act readiness, sector readiness.

Architecture

Five EU-resident layers — touchpoints to LLM constellation.

Frameworks

EU AI Act, GDPR, DORA, OWASP — built into the platform, not bolted on.

Customers

Trusted by leaders

How regulated-Europe brands — from Visma to Onguard — turned customer success into a revenue engine with Unless.

Visma Enterprise AS

Norway's leading ERP — modernized self-service with Unless.

Helping patients

Patient self-service surged within weeks of deploying Unless.

Enhancing credit software

Financial service Onguard powers their support operations with Unless.

Ticket deflection at scale

Meet Sally, Kontek’s AI support colleague in regulated finance.

Resources

Search resources and support articles

Documentation, articles, and recipes for getting the most out of your Unless deployment — plus a help desk when you need a human.

Help center

Get-started guides and advanced playbooks for the platform.

Security and compliance

Privacy measures, security by design, and compliance guidelines.

Developer documentation

Find reference documentation for the javascript API.

The Unless cookbook

Bite-sized examples for every stage of the customer lifecycle.

Pricing

Pay per outcome. You choose.

Two equal-weight plans, both built around outcomes. Browse the page, or jump straight to a section.

The two plans

Flex (€0.99 per outcome) or Fixed (€1,999/month). Equal weight.

What's included

Full platform on both — Living Knowledge, Memory, Context.

Flex modules

Productized add-ons. À la carte on Flex, bundled into Fixed.

Frequently asked

What counts as an outcome, fair use, and switching mid-year.

Compliance

Architecture and security

We believe in security by design. Discover the Unless mitigation strategies to keep your data safe.

Updated 12 February 2026

Unless adopted a layered security approach, combining robust validation processes, strict access controls, continuous monitoring, and educating users and developers about potential vulnerabilities. By focusing on least-privilege access, consistent data sanitization, and secure plugin designs, we enhance the resilience of our application, creating a safer, more reliable platform for users and organizations.

Architecture

For context, the Unless platform architecture looks like this.

UNLESS architecture 2026

LLM security risk mitigation

OWASP Full Logo R Black

Below are the top ten risks for LLM applications as composed by OWASP, with a brief description of each and mitigation strategies that we apply at Unless.

  1. Prompt Injection
    Attackers may manipulate the LLM through crafted inputs, potentially leading to data exfiltration, social engineering, or backend system exposure.

    Mitigation: We enforce privilege control, validate and cleanse untrusted content, and limit backend access to only necessary API tokens.

  2. Insecure Output Handling
    This may occur when the outputs generated by an LLM are passed downstream without proper validation, leading to vulnerabilities like XSS or privilege escalation.

    Mitigation: We treat LLM responses with zero-trust, implement strict validation, and sanitize outputs.

  3. Training Data Poisoning
    Malicious actors may insert harmful or biased data into LLM training, which affects model behavior and output quality.

    Mitigation: We vet training data rigorously, establish trusted sources, and use anomaly detection to flag poisoned data that can be checked by a human before it gets used.

  4. Model Denial of Service (DoS)
    Attacks could cause resource-heavy LLM operations, degrading service quality or increasing operational costs.

    Mitigation: We limit context window usage, enforce API rate limits, and monitor usage patterns for abnormal resource consumption, on a per account basis.

  5. Supply Chain Vulnerabilities
    Risks arising from third-party model or dataset dependencies, which may introduce outdated or compromised components.

    Mitigation: we use secure model repositories, require a Content Security Policy (CSP), maintain a Software Bill of Materials (SBOM), and monitor suppliers for policy and security updates.

  6. Sensitive Information Disclosure
    LLMs might inadvertently reveal confidential information, exposing sensitive data.

    Mitigation: We employ data sanitization techniques, set strict access controls, and limit external data access within the LLM.

  7. Insecure Plugin Design
    LLM plugins can introduce vulnerabilities if they lack input validation or control over user actions, risking remote code execution.

    Mitigation: We use parameterized inputs, validate plugin authentication, and adopt least-privilege access control for plugin functions.

  8. Excessive Agency
    LLM-based systems with excessive permissions may take unintended actions due to inadequate user oversight.

    Mitigation: We minimize granted functions, require user approval for high-impact actions, and implement granular access levels for LLM plugins.

  9. Overreliance on LLMs
    Dependence on LLMs for critical decisions can lead to misinformation or insecure outputs without human review.

    Mitigation: We implement validation layers, use disclaimers in our UI, and limit the functional purpose of an LLM in our system.

  10. Model Theft
    Unauthorized access to a custom LLM's model, weights, or architecture, leading to intellectual property theft.

    Mitigation: we do not use custom models, hence theft would not be very useful, and by limiting the LLM scope within our services, we can switch our models instantly if a problem would occur.

Data storage

Before getting into the technical details, here are key points about our data handling:

  • We ensure consistent global performance by distributing data across 75 edge locations, but all customer and visitor data is stored exclusively in the EU.
  • User data is securely stored on Amazon Web Services in EU data centers. Our servers run in a Virtual Private Cloud, preventing any external connections to our database.
  • We retain data for up to 365 days and only use it to benefit our users and customers. Data is only used with explicit consent from an Unless account admin, with clear information on its intended use.

Security by design

We prioritize security by design, using tactics like operating in read-only mode, serving static data, and hiding it behind CDN endpoints for DDoS protection. Our edit mode is controlled via an API with similar protections.

This setup offers benefits such as quick DDoS mitigation through integrated systems and edge services. Techniques like stateless SYN Flood mitigation verify connections before they reach protected services. Auto-traffic engineering disperses or isolates DDoS attack impacts, and firewalls offer application layer defense.

Our infrastructure uses Lambda functions, which are triggered on demand and don’t run when idle, enhancing security compared to always-on servers. This serverless architecture eliminates the need for OS maintenance or server management.

We encrypt data-at-rest with FIPS 140-2 validated hardware modules, and data in transit is secured with TLS using SHA-256 with RSA Encryption. Data processed by Lambda functions is protected in a shielded environment.

Development practices

As a SaaS provider, Unless does not distribute new software versions in the way software vendors would. Our service represents one version that is constantly receiving our attention and focus regarding security protocol and development efforts.

Our software developers employ secure coding standards, with ongoing reverse reviews and automated unit testing. Our software is tested internally, and critical features are released in beta to a select number of test customers for live field testing.

Operational service

After formal code reviews, all deployment procedures are automated, with human involvement only required for user testing. We continuously monitor performance, availability, and security through automated processes and occasional manual checks.

We implement additional firewalls to restrict open ports on internet-facing servers. An Intrusion Protection System (IPS) acts as a secondary security layer, blocking access upon detecting suspicious login attempts. Our threat detection service identifies and prevents unauthorized behavior to avert security breaches.

Only engineers who need access to perform their tasks efficiently are granted system access, with varying rights based on their responsibilities. Unique credentials are assigned, and SSH Key-Based authentication is used for server access. Security access rights are reviewed monthly.

Patch management is designed to avoid affecting security vulnerabilities. Our microservices architecture allows for independent updates of system components, enabling targeted patches and bug fixes. We conduct continuous data backups for point-in-time recovery (PITR), maintaining electronic copies for 35 days with encryption during transit and at rest.

A legal retention policy requires the deletion of personal data, including files, databases, and backups, with encryption using 256-bit Advanced Encryption Standard (AES-256).

Organizational aspects

We allow customers to further improve their organizational security, by offering different user access levels.

  • Admins: all rights within a customer account.
  • Users: everything except user management.
  • Support agents: access to customer support features only.

The customer has the sole right of granting access to anyone. Unless employees have no access by default. Passwords are always hashed and salted using bCrypt. Additionally, data at rest and in motion is always encrypted by using TLS with at least 128-bit AES encryption. Data transport is over TLS using SHA-256 with RSA Encryption.

Frequently asked questions

What is security risk mitigation at Unless?

UNLESS security risk mitigation is the set of controls that lets regulated buyers ship AI without taking on hidden risk. The controls cover infrastructure security, access management, data protection, model behavior, and incident handling. The goal is simple: real automation with a clean audit.

Which security frameworks does Unless follow?

Unless follows information security management aligned with ISO 27001 and ISO 27002, layered with EU privacy and risk requirements. Together, those support your own obligations under GDPR, DORA, ISO 42001, EU AI Act, and entities supervised by BaFin and AFM.

How is data protected in transit and at rest?

Strong industry-standard encryption protects data in transit and at rest. Sensitive identifiers are tokenized through the Privacy Vault so most of the platform works on de-identified data. Strict access control and environment segregation keep production data separate from everything else.

How are access and authentication handled?

Role-based access control, strong authentication, and optional SSO. Roles can be split between admin, AI manager, and reviewer, with separate test and production environments. Changes to agents, sources, and workflows go through review before they reach customers.

How does Unless mitigate AI model risk?

Through the constellation. We control which model handles which workload, isolate them from each other, and switch quickly if a provider or regulation changes. Every answer is grounded in Living Knowledge, with guardrails that stop out-of-scope or unsafe behavior. Customer data is not used to train public models.

What is the incident response process?

Unless runs a documented incident response process to detect, assess, and contain security or privacy events. If an incident affects your data or environment, we notify you without undue delay, share the relevant detail, support the investigation, and work with you on mitigation and lessons learned.

How does Unless support our own audits?

We share a security addendum, DPIA inputs, sub-processor list, data-flow diagrams, and the technical and organizational measures document. Our team works directly with your security, risk, and compliance leads to answer due-diligence questionnaires and to align our controls with your internal policies.

What stays the customer's responsibility?

You own your acceptable-use policy, your user accounts, your decisions about which data and actions are allowed, and your own regulatory assessments. We give you the platform controls. You configure them in the way that fits your business and your regulator.

How does the platform prevent misconfiguration?

Safe defaults, role separation, and visible audit. You can review conversations, restrict actions, run changes through test environments first, and watch the monitoring dashboards for low-confidence or out-of-policy answers. The dashboard makes it easy to see what changed and who changed it.

How often are security controls reviewed?

Continuously. The information security management process runs all year. We monitor for vulnerabilities, update dependencies, and tighten controls in response to new threats, regulation, customer feedback, and audits, internal or external.

We're here to help

Quick responses if you have an issue. Feel free to ask us anything — or ask our conversational AI a question.