Air-gapped deployment. Zero cloud dependencies. Built for professional services.
Client contracts and compliance requirements demand better
Designed for firms with the highest confidentiality requirements
Deploy on your internal network with no external connectivity. All data stays within your security perimeter. No cloud services, no external APIs, no internet access required. Perfect for law firms, healthcare providers, and financial advisors.
No vendor access to your deployment. No support backdoors. No telemetry or analytics sent anywhere. Your IT team has complete control. Audit the open source code yourself to verify security claims.
Demonstrate technical controls to demanding clients. Architecture diagrams included. Data flow documentation provided. Open source allows client security teams to review code. Passes third-party security questionnaires.
Technical architecture prevents identity tracking. Token-based access with no authentication logs. Configurable minimum response thresholds. Protects both reviewers and reviewees in sensitive firm environments.
Includes templates for ISO 27001, SOC 2, and GDPR documentation. Security control descriptions ready for compliance frameworks. Data processing documentation for client audits. Privacy impact assessment materials provided.
Configure with your internal mail server. No external email services required. All email stays within your network. Support for Exchange, Office 365 on-premises, or any SMTP server you control.
Anonymous invitation links ensure reviewer identities are never tracked or stored
Professional reports with anonymity protection built-in
Trusted by firms with the highest confidentiality standards
Requirements Met: Attorney-client privilege protection, ABA ethics compliance, conflict check isolation, partner compensation confidentiality, client audit requirements met.
Typical Setup: Air-gapped deployment behind firm firewall. Internal SMTP only. Managed by firm IT. Review cycles for attorneys, paralegals, support staff.
Requirements Met: HIPAA compliance readiness, patient data separation, clinical confidentiality, FDA validation support, protected health information isolation.
Typical Setup: Deployed in healthcare network. No PHI stored in system. Clinical and administrative staff reviews. Integration with internal directories.
Requirements Met: FCA/SEC examination readiness, client confidentiality, Chinese Wall compliance, market abuse prevention, audit trail requirements.
Typical Setup: Segregated network deployment. Compliance-approved configuration. Detailed audit logs. Support for multiple legal entities within one firm.
Requirements Met: Client confidentiality agreements, conflict of interest controls, engagement team isolation, proprietary methodology protection, NDA compliance.
Typical Setup: Project-based review cycles. Partner and consultant assessments. Integration with resource management. Protected behind VPN.
Requirements Met: Client privilege protection, professional standards compliance, quality control requirements, peer review preparation, ethics standards.
Typical Setup: Separate staff and partner reviews. Technical competency assessments. Annual review cycles aligned with promotion timelines. Audit-ready documentation.
Requirements Met: Classified information isolation, ITAR/EAR compliance, government security standards, FedRAMP-equivalent controls, audit requirements.
Typical Setup: Deployed on classified networks. No external connectivity. Government-approved encryption. Complete access control logging.
Three deployment modes to match your security requirements
Setup: Internal server, no internet access, manual report generation
Best For: Law firms, defense contractors, highly regulated industries
Features: Complete isolation, no external dependencies, passes strictest client audits
Setup: Internal server with restricted outbound access for email
Best For: Healthcare, financial services, mid-size professional firms
Features: Controlled external access, email invitations work
Setup: Cloud server accessible only via firm VPN
Best For: Consulting firms, accounting firms with remote teams
Features: Remote access for distributed teams, still fully isolated from public internet
Self-hosted infrastructure • No third-party access • Open source auditability • Your security controls • Client requirement compliance
Documentation and controls for major compliance standards
| Compliance Standard | Blik Support | Key Controls Satisfied |
|---|---|---|
| ISO 27001 | ✓ Documentation Provided | Access control, encryption, audit logging, data classification, incident response |
| SOC 2 | ✓ Control Templates | Security, availability, confidentiality, privacy, processing integrity |
| GDPR | ✓ Fully Compliant | Data residency, subject rights, privacy by design, DPA not required |
| HIPAA | ✓ BAA Template | Access controls, audit logs, encryption, PHI separation guidance |
| FedRAMP | ✓ Control Mapping | Self-hosting enables government cloud requirements |
| PCI DSS | ✓ Network Isolation | Segmentation, access control, encryption, no cardholder data stored |
Why spend 50,000+ EUR per year on cloud tools you cannot use?
Lattice: 8-12 EUR/user/month
Culture Amp: 10-15 EUR/user/month
15Five: 6-10 EUR/user/month
Problem: Cannot meet your client confidentiality requirements
Cost: Partner time, admin overhead
Time: 20-40 hours per review cycle
Issues: Error-prone, not anonymous, hard to aggregate
Problem: Unprofessional and time-consuming
Licensing: 0 EUR (open source)
Server: 100-200 EUR/month
Time: 2 hours setup, 1 hour per cycle
Solution: Professional, compliant, cost-effective
Commercial Tool: 3,000 EUR/year | Manual Process: 8,000 EUR (partner time) | Blik: 1,200 EUR/year (server only) | Savings: 2,000-7,000 EUR annually
Yes. For air-gapped deployment: 1) Use internal SMTP server for emails, 2) Deploy on internal Linux server. No external connectivity required. System is fully functional offline. Perfect for classified environments or firms with zero-trust policies.
Minimum: 4GB RAM, 2 vCPU, 40GB storage for up to 100 employees.
Recommended: 8GB RAM, 4 vCPU, 100GB storage for 200+ employees with historical data.
OS: Ubuntu 22.04+ or RHEL 8+.
Database: PostgreSQL 15+ (included in Docker setup). Scales vertically as needed.
Blik provides: 1) Architecture diagrams showing data flows, 2) Technical documentation of security controls, 3) Access to full source code for review, 4) Templates for common compliance frameworks (ISO 27001, SOC 2, GDPR), 5) Audit log exports from database. Open source means clients can verify security themselves.
LDAP integration is on the roadmap but not currently implemented. For now, admins use Django's built-in authentication. Since reviewers never log in (token-based access), only admin accounts need management. For firms requiring LDAP, you can modify the authentication backend in the open source code or wait for the next major release.
Architecture prevents identity tracking: 1) Tokens contain no identifying information (UUID only), 2) No login required for reviewers, 3) Responses stored without token reference after submission, 4) Configurable minimum thresholds (e.g., 3+ peers before showing results), 5) No IP logging in production mode. Anonymity is architectural, not policy-based.
PostgreSQL backup strategies: 1) pg_dump for point-in-time backups, 2) WAL archiving for continuous backup, 3) Streaming replication for high availability. Store backups on your SAN, tape, or segregated network. All backup data remains in your control. Restoration tested and documented. RTO typically under 1 hour.
Direct database access allows full control. Django admin includes employee deletion. For complete erasure: 1) Identify employee records in database, 2) Run provided deletion scripts, 3) Remove from backups (or note in retention log), 4) Document deletion for audit. Typically completed in under 15 minutes. Maintained audit trail proves compliance.
Typical deployment timeline for firms
Activities: IT reviews documentation, Security approves architecture, Compliance maps to requirements, Partner sponsors identified
Deliverables: Deployment plan, security assessment, compliance checklist
Activities: Provision internal server, Deploy Docker containers, Configure SMTP and settings, Import employee list
Deliverables: Running system, admin access, initial testing complete
Activities: Run pilot review cycle with one department, Gather feedback, Adjust anonymity thresholds, Train administrators
Deliverables: Pilot report, user feedback, configuration refinements
Activities: Announce to full firm, Create review cycles, Send invitations, Generate reports
Deliverables: Firm-wide review complete, Reports delivered, Process documented
Includes security review, compliance approval, and pilot testing. Much faster than 8-12 week implementations for commercial tools.
Protect client confidentiality while modernizing performance reviews.
For air-gapped deployments and complete data control, our open-source version is perfect. Or if GDPR-compliant EU hosting meets your needs, try our managed option at €49/month.
View All OptionsTrusted by law firms, healthcare providers, and financial advisors