Security & Privacy

We are dedicated to creating a safe and secure platform for our users. In fact, it is super critical to us that your data remains safe, and we constantly monitor and work towards closing any threats that might put it at risk.
Greater peace of mind
We partner with the best
Keewano’s platform is built on top of the best-in-class infrastructure providers such as GCP and CloudFlare. We carefully choose the most secure solutions when it comes to data and security, and always keep updated with industry best-practices to ensure we are in accordance with changes and updates.

Reporting issues and threats
If you have encountered an issue or a flaw that may have an impact on the data security or privacy of Keewano users, please let us know at contact@keewano.com, so we can investigate it right away. For more info on our Bounty Policy Program, please reach out to contact@keewano.com.

Cloud provider compliance & certifications

ISO/IEC 27001:2022 which is the most rigorous global security standard for Information Security Management Systems (ISMS).

ISO/IEC 27017:2015 provides controls and implementation guidance for both cloud service providers and cloud service customers.

ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII).

ISO/IEC 27032:2012 provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity, and its dependencies on other security domains.

ISO/IEC 27701:2019 specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS).

The Health Insurance Portability and Accountability Act (HIPAA).

Service Organization Control (SOC) 1 Type II Report.

Service Organization Control (SOC) 2 Type II Report.

Service Organization Control (SOC) 3 Report.

General Data Protection Regulation (GDPR). For the success of our customers and the protection of their personal data.
Keewano helps you leverage your data
to gain deeper insights and automate
root cause analysis - without using,
selling, or enriching your data.
Operation
Environment
All Keewano services are protected by firewalls and various other systems. Technical access is allowed through dedicated subnets and VPNs.
Authentication and
Authorization
To build reliable and distributed security architecture at Keewano we used OAuth2, OpenID Connect and JSON Web Tokens (JWT) which are industry standards for security, authentication and authorization.
Users Data
Protection
Passwords and other sensitive information saved encrypted, which adds another layer of data encryption.
Token based access
Development and API access is protected using dedicated Account and/or User tokens for secured identifications and authorization of the requesting party.
Communication
All Keewano data transfers are carried out via an SSL-encrypted connection.
Protect personal data
We’re committed to keeping your personal data safe. We’ve built Keewano in compliance with industry best practices and major laws like the GDPR and the CCPA.
User permissions and role controls
User permissions and role controls are essential parts of application security. They ensure that people accessing an application can only perform actions and view data that align with their responsibilities or clearance levels.
Questions About Security?
Have a question, concern, or comment about Keewano security?
Please contact Keewano support: