Product Updates

Published

Written by

Workbench

What SOC 2 Type II Means for Your Design Data on Quilter

Published

March 12, 2026

If you’ve evaluated Quilter, or any cloud-based engineering tool, you’ve probably had the security conversation. Maybe you’ve had it multiple times: once with your team, once with IT, and once with procurement. We hear the same questions in nearly every conversation with engineering leaders: 

Where does my data go? Who can see it? Are you training on my designs?

These are the right questions to ask. And as of this month, we have an independently verified answer: Quilter is SOC 2 Type II compliant.

What SOC 2 Type II Actually Covers

SOC 2 is a compliance framework developed by the AICPA that evaluates how a SaaS provider protects customer data. There are two types. Type I checks whether security controls are designed correctly at a single point in time. Type II is more rigorous: the auditor evaluates whether your security controls are working effectively over an extended observation period, typically 3 to 12 months.

In practical terms, SOC 2 Type II means an independent auditor reviewed Quilter’s cloud infrastructure, access controls, data handling procedures, incident response processes, and availability practices — and confirmed that they work, consistently, over time.

What This Means for You

If you’re an engineer evaluating Quilter, the short version is: your design data is protected by enterprise-grade controls, and we can prove it. Here are the specifics:

  • Isolated workspaces. Each customer operates in their own secure workspace on AWS. No one outside your organization, including other Quilter customers, can access your data.
  • No data training. Quilter is not a large language model. We train our AI through reinforcement learning on synthetic data. We don’t ingest, read, or learn from any customer designs. Your IP stays yours.
  • You own your output. When Quilter places and routes your board, the result belongs to you. We’re a tool, not a co-author.
  • Data access on your terms. We don’t look at your designs unless you explicitly ask us to — for example, during a guided pilot where our engineering team helps you get the best results.

If you’re in IT or procurement, you can request the full SOC 2 Type II report. We’re happy to support your vendor security review and answer any follow-up questions.

Why This Matters Now

We’ve talked with engineering teams at companies where security review timelines add weeks or months to a pilot decision. SOC 2 Type II changes that. It’s a standard artifact that IT and procurement teams recognize and can evaluate against their own requirements.

This doesn’t mean security review disappears entirely — many organizations have additional requirements, and we expect that. But it gives your internal teams a verified starting point instead of a blank questionnaire.

On-Premise Option

For organizations that need to go further, ITAR-controlled programs, classified environments, or any situation where cloud isn’t an option, Quilter is also available as an on-premise deployment. You run it on your own infrastructure. The software is identical; only the hosting model changes.

Try Quilter for Yourself

Project Speedrun demonstrated what autonomous layout looks like in practice and the time compression Quilter enables. Now, see it on your own hardware.

Get Started

Validating the Design

With cleanup complete, the final question is whether the hardware works. Power-on is where most electrical mistakes reveal themselves, and it’s the moment engineers are both nervous and excited about.

Continue to Part 4

Cleaning Up the Design

Autonomous layout produces a complete, DRC'd design; cleanup is a brief precision pass to finalize it for fabrication.

Continue to Part 3

Compiling the Design

Once the design is prepared, the next step is handing it off to Quilter. In traditional workflows, this is where an engineer meets with a layout specialist to clarify intent. Quilter replaces that meeting with circuit comprehension: you upload the project, review how constraints are interpreted, and submit the job.

Continue to Part 2

What SOC 2 Type II Means for Your Design Data on Quilter

March 12, 2026
by
Nick Faughey
and

If you’ve evaluated Quilter, or any cloud-based engineering tool, you’ve probably had the security conversation. Maybe you’ve had it multiple times: once with your team, once with IT, and once with procurement. We hear the same questions in nearly every conversation with engineering leaders: 

Where does my data go? Who can see it? Are you training on my designs?

These are the right questions to ask. And as of this month, we have an independently verified answer: Quilter is SOC 2 Type II compliant.

What SOC 2 Type II Actually Covers

SOC 2 is a compliance framework developed by the AICPA that evaluates how a SaaS provider protects customer data. There are two types. Type I checks whether security controls are designed correctly at a single point in time. Type II is more rigorous: the auditor evaluates whether your security controls are working effectively over an extended observation period, typically 3 to 12 months.

In practical terms, SOC 2 Type II means an independent auditor reviewed Quilter’s cloud infrastructure, access controls, data handling procedures, incident response processes, and availability practices — and confirmed that they work, consistently, over time.

What This Means for You

If you’re an engineer evaluating Quilter, the short version is: your design data is protected by enterprise-grade controls, and we can prove it. Here are the specifics:

  • Isolated workspaces. Each customer operates in their own secure workspace on AWS. No one outside your organization, including other Quilter customers, can access your data.
  • No data training. Quilter is not a large language model. We train our AI through reinforcement learning on synthetic data. We don’t ingest, read, or learn from any customer designs. Your IP stays yours.
  • You own your output. When Quilter places and routes your board, the result belongs to you. We’re a tool, not a co-author.
  • Data access on your terms. We don’t look at your designs unless you explicitly ask us to — for example, during a guided pilot where our engineering team helps you get the best results.

If you’re in IT or procurement, you can request the full SOC 2 Type II report. We’re happy to support your vendor security review and answer any follow-up questions.

Why This Matters Now

We’ve talked with engineering teams at companies where security review timelines add weeks or months to a pilot decision. SOC 2 Type II changes that. It’s a standard artifact that IT and procurement teams recognize and can evaluate against their own requirements.

This doesn’t mean security review disappears entirely — many organizations have additional requirements, and we expect that. But it gives your internal teams a verified starting point instead of a blank questionnaire.

On-Premise Option

For organizations that need to go further, ITAR-controlled programs, classified environments, or any situation where cloud isn’t an option, Quilter is also available as an on-premise deployment. You run it on your own infrastructure. The software is identical; only the hosting model changes.