Our system is meticulouslydesigned to safeguard our customers' sensitive data, providing unparalleledsecurity measures. For further information, our entire SOC-2 report isavailable for viewing after signing an appropriate NDA.
All of our services are hostedwith Google Cloud Platform (GCP), under a single VPC owned by Akooda, andemploy a robust security program with multiple certifications.
Our applicationsencrypt in transit with TLS/SSL only.
All retained data isencrypted at rest by a validated crypto module utilizing AES 256 bitencryption. All data in transit is encrypted using TLS 1.2+.
Akooda strictly followspermission settings, showing users only the information they can access in thesource application. Any changes in permissions are immediately updated inAkooda's results, ensuring data integrity and security.
Only authorized employees withspecific roles and permissions can access cloud infrastructure and sensitivetools. We offer Single Sign-on (SSO), 2-factor authentication (2FA), and strongpassword policies for added security when accessing cloud services.
We implement the least privilegeprinciple in identity and access management which means employees have only theaccess they need for their roles, reducing the risk of unauthorized access andenhancing overall security.
We employ routinemonitoring to safeguard our systems against threats and vulnerabilities. Adheringto industry best practices, we ensure the security of our systems at all times.
We log, monitor androutinely audit all internal activities within our systems to ensure the safetyof our systems.
“as someone who has been in cyber security for over a decade, it was my goal from day one to build Akooda with privacy and security as a core focus. our customers can be rest assured that we are constantly implementing bleeding-edge best practices to keep the product secure.”
Itamar Niddam
CTO, Akooda