Reflect Memory

Cross-Agent Persistent Memory

Private Context For Teams

Self-hosted or VPC deployment with SSO, audit trails, model egress control, and dedicated support. Pricing depends on deployment scope, compliance requirements, and team size.

Deterministic and AuditableMemories are written explicitly and retrieved deterministically. No ambient data collection, no hallucinated context, no black-box inference.

No ambient data collection

Every memory is written through a structured API with explicit intent. Nothing is inferred, scraped, or collected passively.

Single memory store, every AI tool

One store serves Cursor, Claude, ChatGPT, and every other AI tool your team uses. Standardize without consolidating vendors.

MCP-native

First-class Model Context Protocol support. AI tools connect via MCP, REST API, or Custom Actions.

No vendor lock-in

Memories are portable across tools and providers. Switch AI vendors without losing institutional context.

Structured pilot processEvery enterprise engagement follows a scoped evaluation process designed for security review and procurement timelines.

01

Walkthrough

We scope your team’s use cases, deployment requirements, and security constraints. 30-minute call.
02

Structured pilot

Private instance on your infrastructure. Your team evaluates with real workflows. Typical pilot: 2–4 weeks.
03

Production rollout

Dedicated support for production deployment. Custom SLA, SSO integration, and ongoing account management.

How does this compare to Mem0, Supermemory, and others?

Side-by-side capability matrix across 8 alternatives.

See the Comparison

Your infrastructure, your boundary

Same product across every deployment model. Choose the boundary that fits your security requirements.

Hosted
Isolated Hosted
Self-Host
Runs onReflect cloudDedicated instanceYour VPC / on-prem
Data residencyUS multi-tenantRegion of choiceYour infrastructure
Network boundaryPublic APIIsolated endpointAir-gapped capable
Model egressEnabledConfigurableDisabled by default
AuthAPI keys + OAuthSSO + API keysSSO + API keys + OIDC
Audit trailStandardExtendedFull, queryable, exportable
Tenant isolationLogicalProcess-levelPhysical

Defense-in-depth by defaultEvery layer designed for regulated environments. Your security team gets complete oversight.

Authentication

API key with timing-safe comparison · SSO / OIDC (Okta, Azure AD, Google, Auth0, Keycloak) · OAuth 2.1 with PKCE for MCP connections

Encryption

TLS in transit (enforced) · Operator-managed at rest (LUKS, EBS, CMEK) · Hash-only API key storage

Audit Trail

Every auth attempt, data access, admin action logged · Query, export, and prune capabilities · Configurable retention policies

Model Egress Control

Block all outbound AI provider requests · Restrict to internal model endpoints only · Self-host mode disables egress by default

Tenant Isolation

Dedicated storage volume per deployment · Tenant ID markers prevent cross-deployment access · Per-user data isolation within each deployment

Compliance

SOC 2 alignment · GDPR considerations built in · HIPAA-ready in self-host mode

Single-tenant by design

Every enterprise deployment runs as an isolated instance with its own process, database, and network boundary. No shared infrastructure with other tenants.

Self-host mode disables all outbound AI provider requests by default. Your security team controls which endpoints, if any, are reachable.

Built for teams that lose engineering context every time they switch AI tools.

Docker / Helm
Single container, env-based config, bootstrap script
Air-gapped capable
No telemetry, no phone-home, no external dependencies
Network isolation
Runs in your VPC, behind your firewall
MCP + REST + Actions
Three integration paths, same memory store
Compliance ready
SOC 2, GDPR, HIPAA alignment out of the box

Start with a structured pilot tailored to your stack

We deploy a private instance on your infrastructure and scope the evaluation to your team's security requirements and success criteria.

Enterprise | Reflect Memory | Reflect Memory