Introducing AgentCloak:
Advanced data leak protection for AI Agents
Comply with AI data protection and cross-border Sovereign AI requirements
Tuned AI detects and generalizes, tokenizes, hashes, and masks protected data, and then uncloaks data in responses
Maintain secure digital twins with custom schemas governed by identity context from identity servers and authorization tokens.
Immediately protects agents and autonomous agents as an MCP Server, MCP proxy, A2A proxy, REST API or web services proxy.
Data protection trusted by top multinationals and approved by the most rigorous regulators



Expand your identity system to multiple countries
InCountry’s secure digital twins fully isolate identity profiles in their country of origin. Avoid the cost and burden of cross-border data transfers.

Comprehensive data residency for Salesforce
Operate a unified global Salesforce platform with customer digital twins fully isolated in countries mandating data residency. Manage operations globally using cloaked data, while enabling local staff and customers to seamlessly access uncloaked data.

Data residency in China
Extend your Salesforce, ServiceNow, and internal applications with subsidiaries and partners in China. Maintain a global view using cloaked data, while InCountry keeps sensitive data uncloaked in China to meet compliance requirements such as PIPL and MLPS.

Securely built for global compliance
InCountry’s secure digital twins isolate sensitive data in countries worldwide using proxy services and APIs with auditable logging and provenance. Robust data cloaking features include masking, tokenization, and hashing.
The turnkey, enterprise-grade solution for data residency
- Two points-of-presence in each country with active-active failover
- SaaS, single-tenant anywhere, AWS Outposts, and sovereign cloud options
- Guaranteed messaging across unpredictable networks
- Automatically makes forms data residency aware
- Support for Reports, Service Console, attachments, APEX SDK
- Flexible tokenization, hashing, and masking algorithms
- Policy-based authorization and fine-grained authorization from apps
- Secure SDLC and operations with active threat monitoring
- Searchable encryption using NIST standards
- Data loss prevention across borders with data firewall and AI PII detection
- Detailed support for regulatory approval in complex jurisdictions
- Downloadable audit logs track every event