Skip to content

Frequently Asked Questions

How Do I install Tesorai Search?

No need for installation; Tesorai Search is web-based, unlike many other tools that require installation and frequent updates on workstations. See the Get Started guide for more information.

If your organization requires an on-prem solution, please reach out to info@tesorai.com.

What types of datasets does Tesorai support?

Tesorai specializes in analyzing mass spectrometry-based proteomics data, including DDA, DIA, TMT and large datasets including immunopeptidomics. Our AI models are also designed to extract signal from noisy, high-throughput datasets such as:

  • Affinity purification with mass spectrometry (AP-MS)
  • Covalent fragment screening with mass spectrometry
  • DNA-encoded libraries (DELs)
  • Phage display
  • Small-molecule binding or activity assays
  • Ribosome profiling
  • Plate-based biochemical or cellular assays

Our platform is adaptable to novel assay formats and excels in improving sensitivity and interpretability in difficult-to-analyze datasets.

Can Tesorai operate in our own cloud environment to integrate with internal workflows?

Yes, Tesorai supports Bring Your Own Cloud (BYOC) deployments, allowing you to run our platform securely within your own infrastructure. This ensures compliance with internal IT policies and enables seamless integration with your existing data pipelines and compute environment. Please reach out to us at info@tesorai.com for more information.

Do you support custom analyses or new assay types?

Yes — in addition to our pre-trained models, we offer custom AI fine-tuning or development and scientific support to adapt our tools to your specific assay, biology, or workflow. Whether you’re working with a non-standard protocol or emerging data type, our team can collaborate with yours to tailor analysis and maximize insight using our AI platform.

How does Tesorai ensure the privacy and security of our data?

We use Google Cloud Storage (GCS) to store your data, which is designed with multiple layers of protection. Here are several key measures we take to safeguard your information:

  • Robust Encryption: All data stored on GCS is encrypted at rest and in transit. This means your data is encrypted before it is written to disk and is also protected as it travels between our servers and GCS, preventing unauthorized access.
  • Compliance and Certifications: GCS complies with major security standards and certifications such as ISO 27001, which helps protect data from security threats or breaches. By complying with these standards, we ensure that our security measures meet international security guidelines.
  • Access Controls: We implement strict access controls and auditing capabilities. Access to data is tightly controlled and limited to authorized personnel only, based on their role. We also use advanced identity and access management policies to prevent unauthorized access.
  • Regular Security Audits: We regularly review and update our security practices. This includes conducting security audits and vulnerability scans to ensure that our defenses remain effective against new threats.
  • Data Redundancy: GCS provides high durability via data redundancy. This means your data is automatically replicated across multiple locations to prevent data loss due to hardware failures or other incidents.

By leveraging Google Cloud’s robust infrastructure and adhering to best practices, we ensure that your data is secure and protected at all times. If you have any more questions about our data security measures, please feel free to contact us.