Security Portal

Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Here at Akeero we understand that our customers expect us to protect their data with the highest standards and are committed to providing them with a highly secure and reliable environment.

Our security model and controls are based on international standards and industry best practices, including as ISO 27001, OWASP Top 10 and AWS Well Architected.

Akeero implements a security oriented design in multiple layers, on both the application and infrastructure layer: The Akeero application is developed according to the OWASP Top 10 framework and all code is peer reviewed prior to deployment to production. Our controlled CI/CD process includes static code analysis, software composition analysis, vulnerability assessment, penetration testing, and more.

Independent third party assessments are crucial in order to get an accurate, unbiased understanding of an organisation’s security posture. Akeero conducts penetration tests on an annual basis or after any major change, both at the application and the infrastructure level, using highly qualified, independent assessors.

Compliance

GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Akeero is reviewed and trusted by

permanent tsbpermanent tsb
4 Documents
Pentest Report
ISO 27001
CAIQ
Acceptable Use Policy

Risk Profile

Data Access LevelInternal
Impact LevelSubstantial
Recovery Time Objective< 12 Hours
See more

Product Security

Role-Based Access Control
Audit Logging
Data Security
See more

Reports

Network Diagram
Pentest Report
Security Whitepaper

Self-Assessments

CAIQ

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Responsible Disclosure
Code Analysis
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
Amazon Web Services
Infrastructure Security
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response

Network Security

Firewall
IDS/IPS
Security Information and Event Management
See more

Corporate Security

Employee Training
Incident Response
Internal Assessments
See more

Security Grades

Qualys SSL Labs
Akeero website
A

Trust Center Updates

Akeero security update on Okta

While Akeero uses Okta internally for employee authentication to business systems, we are not affected by the recent compromise that affected Okta. There has been no loss of confidentiality, integrity or availability of any of Akeero's systems and data.

​Anthi Gilligan Chief Information Security Officer Akeero

Published at 03/24/2022, 4:34 PM

If you think you may have discovered a vulnerability, please send us a note.