Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items


Here at Akeero we understand that our customers expect us to protect their data with the highest standards and are committed to providing them with a highly secure and reliable environment.

Our security model and controls are based on international standards and industry best practices, including as ISO 27001, OWASP Top 10 and AWS Well Architected.

Akeero implements a security oriented design in multiple layers, on both the application and infrastructure layer: The Akeero application is developed according to the OWASP Top 10 framework and all code is peer reviewed prior to deployment to production. Our controlled CI/CD process includes static code analysis, software composition analysis, vulnerability assessment, penetration testing, and more.

Independent third party assessments are crucial in order to get an accurate, unbiased understanding of an organisation’s security posture. Akeero conducts penetration tests on an annual basis or after any major change, both at the application and the infrastructure level, using highly qualified, independent assessors.


ISO 27001 Logo
ISO 27001
Start your security review
View & download sensitive information
Ask for information

Akeero is reviewed and trusted by

permanent tsb-company-logopermanent tsb
Pentest Report
ISO 27001
Acceptable Use Policy

Risk Profile

Data Access LevelInternal
Impact LevelSubstantial
Recovery Time Objective12 hours
View more

Product Security

Audit Logging
Data Security
View more


Network Diagram
Pentest Report
Security Whitepaper



Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Responsible Disclosure
Code Analysis
Credential Management
View more

Data Privacy

Data Breach Notifications
Data Into System
View more

Access Control

Data Access
Password Security


Amazon Web Services
Infrastructure Security
View more

Endpoint Security

Disk Encryption
Endpoint Detection & Response

Network Security

Security Information and Event Management
View more

Corporate Security

Employee Training
Incident Response
Internal Assessments
View more

Security Grades

Qualys SSL Labs
Akeero website

Trust Center Updates

Akeero security update on Okta

IncidentsCopy link

While Akeero uses Okta internally for employee authentication to business systems, we are not affected by the recent compromise that affected Okta. There has been no loss of confidentiality, integrity or availability of any of Akeero's systems and data.

​Anthi Gilligan Chief Information Security Officer Akeero

Published at N/A

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo