Glean always follows a single-tenant deployment model, whether the tenant is hosted in Glean's central cloud or in the customer's Cloud account. Glean regularly undergoes SOC2 Type II audits, commissions penetration testing and enforces strict security controls to protect customer data regardless of where the tenant is hosted.
Hosted Option
For this option, Glean will host the customer's environment in an isolated single tenant separate from all other customers.
Advantages of hosting in Glean's central cloud:
Simplified setup process.
No requirement of engineering resources to manage the system.
Full auto-scaling as the corpus and users grow.
Rely on Glean's security controls and guarantees to protect your data.
Faster turnaround on bugs/improvements.
Simpler licensing and pricing model. Lower cost due to amortization of maintenance cost on Glean's side. Pay a fixed fee per active user per month.
No employee at Glean retains access to any customer data. Glean only receives sanitized logs (all PII removed) and metrics to support the instance - all actual data remains within the Glean project. To debug production issues that require access to sensitive logs/components, engineers are required to provide justification, and are assigned 1-hour time-bound token for debugging upon approval. All such access is audited.
Cloud-prem Option within GCP or AWS
In the Cloud "on-prem" model, where the tenant is hosted in the customer cloud, Glean typically provides a fully managed service experience similar to what it provides in the centrally hosted model. Glean performs full management and monitoring of the customer project, and doesn't require the customer to perform maintenance tasks like upgrading software etc. It is able to provide all of that without having access to customer data (the IAM controls restrict Glean's access to only project management and gives it no access to underlying customer data in the project).
Advantages of hosting in your cloud:
Know exactly where your data is and the fact that the data never leaves your environment
Customers can control the IAM policies
Customers retain direct access to logs