FAQ
Practical answers before you deploy.
Questions we hear most often from product, engineering, and security leaders evaluating Lyco AI.
What does Lyco AI actually do day to day?+
Lyco AI runs long-trajectory work after upfront alignment. Teams brief a task, provide context and constraints, then Lyco AI executes research, analysis, or implementation and returns output for review.
How is this different from a chat assistant?+
Chat assistants optimize for short back-and-forth sessions. Lyco AI is designed for autonomous execution over longer spans, with progress visibility and review boundaries so teams can focus on higher-leverage work.
How long does onboarding take?+
Most teams can run an initial scoped workflow within days. Full rollout timing depends on integration requirements, security review, and how many teams are involved in phase one.
Which tools can we connect?+
Lyco AI is built to work with existing systems, including code repositories, issue trackers, collaboration tools, and data platforms. If your stack has APIs, we can usually connect it.
How do you handle sensitive data?+
Deployments include scoped access controls, encryption in transit, and operational controls to limit and monitor access. Security requirements are reviewed during setup based on your environment.
Can we require human approvals before risky actions?+
Yes. You can define checkpoints and approval rules for specific task types, systems, or actions. This lets teams tune speed and control based on risk level.
Do you support enterprise procurement and legal review?+
Yes. We support procurement and legal workflows and can provide documentation needed for security and vendor assessments.
How is pricing structured?+
Pricing is based on workflow complexity, autonomy depth, connected systems, and support needs. Most teams start with a pilot scope and expand after proving value.
What does success look like for a pilot?+
A strong pilot has a clear before-and-after metric, a bounded workflow, and an owner accountable for adoption. We align on success criteria before kickoff so outcomes are measurable.
Need details for procurement or security review? Start with our Security Overview and Terms, then contact us for deployment-specific documentation.