REGULATORY COMPLIANCE

Security

Your data is your most valuable asset and we are committed to protecting it through enterprise-grade security across our network, product and entire organization
URS ISO/IEC 27001 certified unified registrar of systems logo
ISO 27001 Accredited
GDPR General Data Protection Regulation badge with stars and padlock symbol
GDPR Compliant

Platform

icon

Encryption

Kleene’s web application operates within an Amazon Virtual Private Cloud (VPC) where HSTS ensures all communication is encrypted.
icon

Connectivity

Safely connect your data sources and destinations with SSH tunneling, SSL/TLS, and IP whitelisting as well as HTTPS for web-based data sources.
icon

Customer Data

Kleene does not retain client data. If temporary data storage is required to execute your pipeline, Kleene can assign a designated FileZone or Object Store for the account to hold the temporary data, or you can use your own to store the temporary data.
icon

Security

Kleene’s Amazon Virtual Private Cloud has subnets segregated by security level and firewalls configured to restrict network access. We use automated vulnerability scans, penetration tests and third party audits to ensure optimal security.
icon

Hosting

Kleene’s servers are hosted in Amazon Web Services, which provides compliance with industry standards including ISO/IEC 27001.

Company

icon

ISO 27001 accredited

Our ISO certification ensures we have an information security management system (ISMS) in place that combines best practices with the controls needed for effective information security.We provide access to our ISO Certificationsonrequest.
icon

Policies

Our comprehensive set of policies covers everything from our software development process to our office environment. These are reviewed regularly and updated annually by our information security team to make sure they are up to date.
icon

Password & access controls

We apply industry-leading encryption and strict access controls to protect credentials. All passwords and authentication methods comply with company standards and undergo continuous monitoring to reduce risk and prevent unauthorised access.
start your journey

Power your data with AI

Join leading businesses with modern data stacks who trust Kleene.ai
icon

Take a quick look inside Kleene.ai app

Watch a product walkthrough and see how Kleene ingests your data, builds pipelines, and powers reporting – all in one place.
icon
AI assistant

Unlock more with  KAI Assistant

Interact with your data faster using our conversational AI