We protect your data

We protect your data

Kizoda is powered by the Amazon AWS technology stack. This means your data is safely stored in ‘best in class’ data centers around the globe every day. All data always moves along encrypted networks, and is written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are encrypted at rest on servers that use modern techniques to remove bottlenecks and points of failure. Project data, messages, text documents and tasks aren’t encrypted at rest — they are active in our database.

Ongoing internal network security audits and scanning gives us an overview for quick identification of impacted systems and services. According to our in-house patch management policy, operating systems, software, frameworks, and libraries used in Kizoda’s infrastructure are updated to the latest compatible versions on a regular basis. Whenever a vulnerability in a product used by Kizoda or a high or critical vulnerability is publicly reported, prompt actions are taken to mitigate any potential risks for our customers — we apply hotfixes and patches promptly when available and/or implement pro-active mechanisms like configuration of firewalls or IDS/IPS.

Kizoda is powered by the Amazon AWS technology stack. This means your data is safely stored in ‘best in class’ data centers around the globe every day. All data always moves along encrypted networks, and is written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are encrypted at rest on servers that use modern techniques to remove bottlenecks and points of failure. Project data, messages, text documents and tasks aren’t encrypted at rest — they are active in our database.

Ongoing internal network security audits and scanning gives us an overview for quick identification of impacted systems and services. According to our in-house patch management policy, operating systems, software, frameworks, and libraries used in Kizoda’s infrastructure are updated to the latest compatible versions on a regular basis. Whenever a vulnerability in a product used by Kizoda or a high or critical vulnerability is publicly reported, prompt actions are taken to mitigate any potential risks for our customers — we apply hotfixes and patches promptly when available and/or implement pro-active mechanisms like configuration of firewalls or IDS/IPS.

Kizoda is powered by the Amazon AWS technology stack. This means your data is safely stored in ‘best in class’ data centers around the globe every day. All data always moves along encrypted networks, and is written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are encrypted at rest on servers that use modern techniques to remove bottlenecks and points of failure. Project data, messages, text documents and tasks aren’t encrypted at rest — they are active in our database.

Ongoing internal network security audits and scanning gives us an overview for quick identification of impacted systems and services. According to our in-house patch management policy, operating systems, software, frameworks, and libraries used in Kizoda’s infrastructure are updated to the latest compatible versions on a regular basis. Whenever a vulnerability in a product used by Kizoda or a high or critical vulnerability is publicly reported, prompt actions are taken to mitigate any potential risks for our customers — we apply hotfixes and patches promptly when available and/or implement pro-active mechanisms like configuration of firewalls or IDS/IPS.

Your data is sent using HTTPS

Your data is sent using HTTPS

Whenever your data is in transit between you and us, everything is encrypted, and sent using HTTPS.

Kizoda uses Transport Layer Security (TLS) 1.2 with a 2048-bit server key length with industry-leading modern browsers. When you access Kizoda via web browser, mobile applications, email add-in, or browser extension, TLS technology protects your information using both server authentication and data encryption. This is equivalent to network security methods used in banking and leading e-commerce sites. All users’ passwords, cookies, and sensitive information are reliably protected from eavesdropping.

Whenever your data is in transit between you and us, everything is encrypted, and sent using HTTPS.

Kizoda uses Transport Layer Security (TLS) 1.2 with a 2048-bit server key length with industry-leading modern browsers. When you access Kizoda via web browser, mobile applications, email add-in, or browser extension, TLS technology protects your information using both server authentication and data encryption. This is equivalent to network security methods used in banking and leading e-commerce sites. All users’ passwords, cookies, and sensitive information are reliably protected from eavesdropping.

Whenever your data is in transit between you and us, everything is encrypted, and sent using HTTPS.

Kizoda uses Transport Layer Security (TLS) 1.2 with a 2048-bit server key length with industry-leading modern browsers. When you access Kizoda via web browser, mobile applications, email add-in, or browser extension, TLS technology protects your information using both server authentication and data encryption. This is equivalent to network security methods used in banking and leading e-commerce sites. All users’ passwords, cookies, and sensitive information are reliably protected from eavesdropping.

Full redundancy for all major systems

Full redundancy for all major systems

Our servers — from power supplies to the internet connection to the air purifying systems — operate at full redundancy. Our systems are engineered to stay up even if multiple servers fail.

Our servers — from power supplies to the internet connection to the air purifying systems — operate at full redundancy. Our systems are engineered to stay up even if multiple servers fail.

Our servers — from power supplies to the internet connection to the air purifying systems — operate at full redundancy. Our systems are engineered to stay up even if multiple servers fail.

Sophisticated physical security

Sophisticated physical security

Our state-of-the-art servers are protected by biometric locks and round-the-clock interior and exterior surveillance monitoring. Only authorized personnel have access to the data center. 24/7/365 onsite staff provides additional protection against unauthorized entry and security breaches.

Our state-of-the-art servers are protected by biometric locks and round-the-clock interior and exterior surveillance monitoring. Only authorized personnel have access to the data center. 24/7/365 onsite staff provides additional protection against unauthorized entry and security breaches.

Our state-of-the-art servers are protected by biometric locks and round-the-clock interior and exterior surveillance monitoring. Only authorized personnel have access to the data center. 24/7/365 onsite staff provides additional protection against unauthorized entry and security breaches.

Regularly-updated infrastructure

Regularly-updated infrastructure

Our software infrastructure is updated regularly with the latest security patches. Our products run on a dedicated network which is locked down with firewalls and carefully monitored using intrusion detection technology. While perfect security is a moving target, we work with security researchers to keep up with the state-of-the-art in web security.

Our software infrastructure is updated regularly with the latest security patches. Our products run on a dedicated network which is locked down with firewalls and carefully monitored using intrusion detection technology. While perfect security is a moving target, we work with security researchers to keep up with the state-of-the-art in web security.

Our software infrastructure is updated regularly with the latest security patches. Our products run on a dedicated network which is locked down with firewalls and carefully monitored using intrusion detection technology. While perfect security is a moving target, we work with security researchers to keep up with the state-of-the-art in web security.

We protect your billing information

We protect your billing information

All credit card transactions are processed using secure encryption—the same level of encryption used by leading banks. Card information is securely transmitted one time to a 3rd party payment gateway, who then stores the card information & returns to us only an identifying hash (ID number) which we store. No payment information or credit card numbers are ever stored on Kizoda’s servers.

All credit card transactions are processed using secure encryption—the same level of encryption used by leading banks. Card information is securely transmitted one time to a 3rd party payment gateway, who then stores the card information & returns to us only an identifying hash (ID number) which we store. No payment information or credit card numbers are ever stored on Kizoda’s servers.

All credit card transactions are processed using secure encryption—the same level of encryption used by leading banks. Card information is securely transmitted one time to a 3rd party payment gateway, who then stores the card information & returns to us only an identifying hash (ID number) which we store. No payment information or credit card numbers are ever stored on Kizoda’s servers.

Want to know more?

Want to know more?

https://www.kizoda.com/contact with additional questions or if you need more details.

https://www.kizoda.com/contact with additional questions or if you need more details.

https://www.kizoda.com/contact with additional questions or if you need more details.

Have a concern? Need to report an incident?

Have a concern? Need to report an incident?

Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Please https://www.kizoda.com/contact for details on how to securely submit a report.

Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Please https://www.kizoda.com/contact for details on how to securely submit a report.

Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Please https://www.kizoda.com/contact for details on how to securely submit a report.

Talk to our chatbot |

Talk to our chatbot |