Our system is meticulously designed to safeguard our customers' sensitive data, providing unparalleled security measures.
All of our services are hosted with Google Cloud Platform (GCP), under a single VPC owned by Akooda, and employ a robust security program with multiple certifications.
Our applications encrypt in transit with TLS/SSL only.
All retained data is encrypted at rest by a validated crypto module utilizing AES 256 bit encryption. All data in transit is encrypted using TLS 1.2+.
Akooda strictly follows permission settings, showing users only the information they can access in the source application. Any changes in permissions are immediately updated in Akooda's results, ensuring data integrity and security.
Only authorized employees with specific roles and permissions can access cloud infrastructure and sensitive tools. We offer Single Sign-on (SSO), 2-factor authentication (2FA), and strong password policies for added security when accessing cloud services.
We implement the least privilege principle in identity and access management which means employees have only the access they need for their roles, reducing the risk of unauthorized access and enhancing overall security.
We employ routine monitoring to safeguard our systems against threats and vulnerabilities. Adhering to industry best practices, we ensure the security of our systems at all times.
We log, monitor and routinely audit all internal activities within our systems to ensure the safety of our systems.
“As someone who has been in cyber security for over a decade, it was my goal from day one to build Akooda with privacy and security as a core focus. Our customers can rest assured that we are constantly implementing best practices to keep the product secure.”
Itamar Niddam
CTO, Akooda