Eka’s Cloud Platform was built from the ground up using the core principles of information security, also known as the AIC triad

  • Availability: Ensure the information is available when needed
  • Integrity: Protecting the reliability & correctness of data through its entire life cycle
  • Confidentiality: Prevent or minimize unauthorized access to data

We take your security very seriously

Enterprise-grade security for your data

  • Compliant with industry standards: SOC 2 Type I, SOC 2 Type II and GDPR/CCPA
  • Single sign-on via industry standard authentication protocols
  • Enterprise-grade security and encryption of data in transit and at REST
  • Integrated with best-in-class DLP, EMM and archival partners
Enterprise-grade security for your data

Data encryption

  • Uses PII (Personally Identifiable Information) to save data with AES-256 encryption within the application before it is stored in the database
  • Data at rest protected in unique non-readable binary format
  • Tested and validated under Veracode Verified Standard status
Data encryption

Data backup

  • Data is stored using AWS S3 Service in a predefined AWS region
  • Data encrypted with AES-256 and backed up every two hours to ensure faster recovery in case of a disaster
  • 24X7X365 infrastructure support, with a 99% availability for application support conforming to industry best practices
Data backup

Security and regulatory

  • Controlled and authorized data access with field level security and role-based hierarchy
  • High data integrity on-the-wire with enhanced security controls and authentication protocols (OAuth 2), and data encryption
  • Advanced anti-hacking and system penetration controls
  • Compliant with global security requirements for audits and regulations including GDPR
Security and regulatory

Trusted by 100+ global businesses