Computer is secure by default. Every task runs in its own hardware-isolated sandbox with VPC-level storage and compute separation. Agents are authenticated with short-lived proxy tokens instead of raw API keys. https://t.co/ohIjY3dboB
Perplexity Secures Computer Agent With Hardware Isolated Sandboxes and Proxy Tokens
- Isolation
- Firecracker microVMs
- Authentication
- Short-lived proxy tokens
- File retention
- 7 days
- SIEM integrations
- Splunk, Azure Sentinel, Datadog
- Compliance
- SOC 2 Type II (2026)
As agents move toward autonomous computer use, security risks like prompt injection (malicious instructions hidden in web content) become critical. Perplexity addresses this by running parallel ML classifiers and its BrowseSafe detection model to scan external data. This mirrors industry moves toward Cloudflare's secure agent sandboxing to protect enterprise environments.
Organizations can manage these agents through centralized controls, including audit logs that integrate with Splunk or Datadog. Admins can toggle connectors for services like Slack or Salesforce and set credit caps. These features are available for Perplexity Enterprise users and inherit the platform's SOC 2 Type II foundation.
Still wondering? A few quick answers below.






