START NOW: Retail Benchmark, compare your business performance with peers
Skip to ContentKleene.ai
Product

Security

Your data is your most valuable asset and we are committed to protecting it through enterprise-grade security across our network, product and entire organization.

Our Platform

Encryption

Kleene’s web application operates within an Amazon Virtual Private Cloud (VPC) where HSTS ensures all communication is encrypted.

Connectivity

Safely connect your data sources and destinations with SSH tunneling, SSL/TLS, and IP whitelisting as well as HTTPS for web-based data sources.

Hosting

Kleene’s servers are hosted in Amazon Web Services, which provides compliance with industry standards including SOC 1, 2 and 3 and ISO/IEC 27001.

Security

Kleene’s Amazon Virtual Private Cloud has subnets segregated by security level and firewalls configured to restrict network access. We use automated vulnerability scans, penetration tests and third party audits to ensure optimal security.

Access Controls

We use role-based access and minimum permissions to make sure that all users can only access the data they need.

Customer Data

Kleene does not retain client data. If temporary data storage is required to execute your pipeline, Kleene can assign a designated FileZone or Object Store for the account to hold the temporary data, or you can use your own to store the temporary data.

Tech colleagues focusing on solving a problem together

Our Company

ISO 27001 Accredited

Our ISO certification ensures we have an information security management system (ISMS) in place that combines best practices with the controls needed for effective information security. We provide access to our ISO Certifications on request.

Policies

Our comprehensive set of policies covers everything from our software development process to our office environment. These are reviewed regularly and updated annually by our information security team to make sure they are up to date.

Passwords

We use industry-standard controls to encrypt our passwords and have strict controls to ensure that all passwords comply with our company policy.

Personnel

From onboarding to regular training, we make sure that every Kleenite understands the importance of information security and how to follow best practices in their day to day. We also use background checks in accordance with UK employment law and the specific requirements of each role.

cross