Keep Your Data Secure with GraphAware Hume

Hume is trusted by law enforcement, intelligence agencies, and cyber-defence agencies to help them analyze and gain insights from their data. That's why Hume is built with security in mind, from top to bottom. To ensure the highest level of security, Hume undergoes regular independent verifications of its security controls.

With the ability to run in the cloud or in air-gapped environments, Hume is a flexible and secure solution for any organization looking to protect their sensitive data and make better informed decisions.

Benefits of Enterprise-Level Security

  • Comply with security requirements: Hume helps you comply with security requirements and regulations, ensuring that your data is protected and your organization is in full compliance.

  • Optimize workflows while ensuring data security: Hume security features enable you to optimize your workflows while ensuring that your data is protected at all times. This helps you to work more efficiently and effectively while ensuring that your data is secure.

  • Ensure data can be analyzed but not compromised: Hume security features allow you to analyze your data without compromising its security. This enables you to gain valuable insights from your data without exposing it to potential threats.

Schedule a live demo

Feature Building Blocks


Secure your knowledge graphs, Orchestra workflows, and machine learning pipelines using Hume's role-based access control (RBAC).

AD, LDAP, and Kerberos Support

Leverage existing users and roles from your Active Directory (AD), LDAP or Kerberos instances.


Reduce the user and access management overhead by enrolling Hume and Neo4j into your organisation's single sign-on (SSO).


Every user action/operation in Hume is logged for auditing purposes.

Failure Handlers

Hume protects your data processing workflows and quickly recovers from errors.


Expose only what users need to perform their analysis by splitting large knowledge graph schemas into multiple dedicated subgraphs (Perspectives).

Encryption in Transit (TLS)

All of Hume's communications are encrypted using TLS to provide security over the network.

Penetration tested

Hume is regularly penetration tested by customers, as well as independent security scanning providers.

FedRAMP White Paper

A white paper is available, evaluating security controls relevant to the acquisition and integration of Hume into an existing FedRAMP High environment.

Secure SDLC

GraphAware operates a Secure Software Development Lifecycle for Hume.

Incident Response Plan

GraphAware has an up-to-date Incident Response Plan in order to support customers in case of a security breach.

See what Hume can do for you - Book your live demo

Just fill in the Contact Form and our team of experts is ready to show you a live demo and answer all your questions.

What to expect:

  • A brief introduction to focus on your organisation's unique needs and requirements.
  • A live demo of Hume tailored to your specific project or domain
  • Zero commitment

Ready to try Hume after the demo?

  • Get access to a free, full-featured trial of Hume on your infrastructure all with the support of our engineers
  • Fine tune your experience and launch to production