Overview
Overview

Here at Akeero we understand that our customers expect us to protect their data with the highest standards and are committed to providing them with a highly secure and reliable environment.

Our security model and controls are based on international standards and industry best practices, including as ISO 27001, OWASP Top 10 and AWS Well Architected.

Akeero implements a security oriented design in multiple layers, on both the application and infrastructure layer: The Akeero application is developed according to the OWASP Top 10 framework and all code is peer reviewed prior to deployment to production. Our controlled CI/CD process includes static code analysis, software composition analysis, vulnerability assessment, penetration testing, and more.

Independent third party assessments are crucial in order to get an accurate, unbiased understanding of an organisation’s security posture. Akeero conducts penetration tests on an annual basis or after any major change, both at the application and the infrastructure level, using highly qualified, independent assessors.

Compliance
Compliance

GDPR Logo
GDPR

Documents
Documents

2 Documents
Pentest Report
Acceptable Use Policy

Risk Profile
Risk Profile

Data Access LevelInternal
Impact LevelSubstantial
Recovery Time Objective< 12 Hours
View 4 More Items

Product Security
Product Security

Role-Based Access Control
Audit Logging
Data Security
View 2 More Items

Reports
Reports

Network Diagram
Pentest Report
Security Whitepaper

Completed Forms
Completed Forms

We are working on our security compliance. We can provide completed quesionnaires upon request.

Data Security
Data Security

Access Monitoring
Backups Enabled
Data Erasure
View 3 More Items

App Security
App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
View 3 More Items

Access Control
Access Control

Data Access
Logging
Password Security

Infrastructure
Infrastructure

Anti-DDoS
Amazon Web Services
Infrastructure Security
View 1 More Item

Security Grades
Security Grades

Qualys SSL Labs
  • Akeero website
    A

Endpoint Security
Endpoint Security

Endpoint Detection & Response

Network Security
Network Security

Firewall
IDS/IPS
Virtual Private Cloud

Corporate Security
Corporate Security

Email Protection
Employee Training
Incident Response
View 2 More Items

If you think you may have discovered a vulnerability, please send us a note.