A Cloud Platform You Can Trust
Eka’s solution suite is multi-tenant deployed on AWS, the leading public-cloud provider. We employ industry best practices to ensure the confidentiality of our customers’ data and to protect them from unwarranted security threats.
Eka’s Cloud Platform Was Built From The Ground Up Using The Core Principles Of Information Security, Also Known As The AIC Triad
- Availability: Ensure the information is available when needed
- Integrity: Protecting the reliability & correctness of data through its entire life cycle
- Confidentiality: Prevent or minimize unauthorized access to data
We Take Your Security Very Seriously
Enterprise-Grade Security For Your Data
- Compliant with industry standards: SOC 2 Type I, SOC 2 Type II and GDPR/CCPA
- Single sign-on via industry standard authentication protocols
- Enterprise-grade security and encryption of data in transit and at REST
- Integrated with best-in-class DLP, EMM and archival partners
Data encryption
- Uses PII (Personally Identifiable Information) to save data with AES-256 encryption within the application before it is stored in the database
- Data at rest protected in unique non-readable binary format
- Tested and validated under Veracode Verified Standard status
Data Backup
- Data is stored using AWS S3 Service in a predefined AWS region
- Data encrypted with AES-256 and backed up every two hours to ensure faster recovery in case of a disaster
- 24X7X365 infrastructure support, with a 99% availability for application support conforming to industry best practices
Security And Regulatory
- Controlled and authorized data access with field level security and role-based hierarchy
- High data integrity on-the-wire with enhanced security controls and authentication protocols (OAuth 2), and data encryption
- Advanced anti-hacking and system penetration controls
- Compliant with global security requirements for audits and regulations including GDPR