Why managed cloud?
Keep deployment boring. Keep operations legible. Spend time on workflows, not plumbing.
Managed by default
Start quickly with a hosted deployment. For regulated teams, we support security review and deployment architecture discussions during procurement.
Security review ready
Audit logs, evidence exports, and data-handling controls designed for review. Security materials are available under NDA when applicable.
Operational visibility
Health monitoring, alerting paths, and incident response runbooks. SLO targets and evidence are shared during review.
Multi-region delivery
CDN-backed marketing assets and regional hosting options. Latency and residency depend on workload and region.
First run, quickly
Start with a single suite. Validate results. Then scale when the evidence chain is clear.
Create Account
Request access or book a demo. We will align on your workflows and review requirements.
Generate API Key
Navigate to Settings → API Keys. Create production key. Copy to env.
Install SDK
npm install @auraone/sdk or pip install auraone-sdk. Full TypeScript types included.
Deploy to Production
Run your first evaluation. Review outputs and evidence, then scale workflows with monitoring in place.
Complete Example
# Install the AuraOne SDK
npm install @auraone/sdk
# Set your API key (from app.auraone.ai)
export AURAONE_API_KEY="your-production-key"
# Your first evaluation
import { AuraOneClient } from "@auraone/sdk";
const client = AuraOneClient.withApiKey(process.env.AURAONE_API_KEY!);
const result = await client.evaluations.create({
template_id: "rubric.web.qa",
agent_bundle_url: "s3://bundle.zip",
wait: true,
});
// You're now running on production cloud infrastructure
console.log("Evaluation complete:", result.id, result.status);Enterprise Infrastructure
Operational guardrails designed for long-running programs.
Compute
- Isolated workloads per organization
- Autoscaling where supported
- Configurable quotas and limits
- Predictable performance envelopes
Storage
- Backups and restore procedures
- Caching for low-latency reads where applicable
- Object storage for exports and artifacts
- Retention policies and deletion workflows
Networking
- TLS encryption in transit
- Private networking options (plan dependent)
- Configurable inbound controls
- CDN-backed asset delivery
Monitoring
- Prometheus metrics collection
- Common monitoring destinations supported
- Health dashboards (as configured)
- Automated alerting via Slack/email
Built for regulated reviews
Controls and evidence are designed to be reviewable. Specific attestations and artifacts depend on your deployment model and engagement.
Encryption
- Encryption at rest and in transit
- Key management options (plan dependent)
- Tenant isolation by design
- Audit-friendly data handling
Compliance
- SOC 2-aligned control mapping
- HIPAA-oriented workflows (as applicable)
- GDPR-ready data handling (where applicable)
- Security questionnaires and architecture review packs
Monitoring
- Alerts and escalation paths
- Runbooks for common incidents
- Workflow-level anomaly signals
- Audit trails tied to runs and exports