Trust is the priority

Our system is SOC-2 Type II certified for datasecurity, backed by expert-led enterprise-grade protection. We never store your raw data in persistent memory, ensuring it stays secure within yourenvironment. We also never bypass existing privacy permissions, guaranteeingstrict adherence to access controls. Read More

Compliance

Soc 2 Type II Certified

Our system is meticulouslydesigned to safeguard our customers' sensitive data, providing unparalleledsecurity measures. For further information, our entire SOC-2 report isavailable for viewing after signing an appropriate NDA.

Data security

Cloud Infrastructure Security

All of our services are hostedwith Google Cloud Platform (GCP), under a single VPC owned by Akooda, andemploy a robust security program with multiple certifications.

Encryption of all data

Our applicationsencrypt in transit with TLS/SSL only.

Secure encryption of data

All retained data isencrypted at rest by a validated crypto module utilizing AES 256 bitencryption. All data in transit is encrypted using TLS 1.2+.

Access Control

Robust Permission Management

Akooda strictly followspermission settings, showing users only the information they can access in thesource application. Any changes in permissions are immediately updated inAkooda's results, ensuring data integrity and security.

Permissions and Authentication

Only authorized employees withspecific roles and permissions can access cloud infrastructure and sensitivetools. We offer Single Sign-on (SSO), 2-factor authentication (2FA), and strongpassword policies for added security when accessing cloud services.

Identity and Access Management

We implement the least privilegeprinciple in identity and access management which means employees have only theaccess they need for their roles, reducing the risk of unauthorized access andenhancing overall security.

Monitoring

Continuous Monitoring

We employ routinemonitoring to safeguard our systems against threats and vulnerabilities. Adheringto industry best practices, we ensure the security of our systems at all times.

Activity Logging

We log, monitor androutinely audit all internal activities within our systems to ensure the safetyof our systems.

“as someone who has been in cyber security for over a decade, it was my goal from day one to build Akooda with privacy and security as a core focus. our customers can be rest assured that we are constantly implementing bleeding-edge best practices to keep the product secure.”

Itamar Niddam

CTO, Akooda

Still have questions?