We understand the importance of keeping your data secure and our Security Principles underpin everything we do.
KADA is SOC 2 Type 2 certified. We test our risk and security measures with external parties through regular Penetration tests.
KADA offers a range of deployment options from on-premise to cloud, allowing you to choose the right option that aligns to your security standards.
KADA incorporates security requirements and controls as a core principle in the design of the K platform.
Connection to KADA’s network from internal or external sources are not automatically trusted. We ensure all connections are authenticated before granting access to systems and information.
Multiple security controls are built independently of each other so failure of one control does not impact the overall security of the K platform.
KADA will only be granted the minimum access needed to its employees to perform their official role. Segregation of duties will be enforced.
Data and system security requirements and controls are implemented in the design of solutions
Connection to KADA’s network from internal or external sources must not be automatically trusted. Connections must be authenticated before granting access to systems and information.
Multiple security controls must be built independently of each other so failure of one control does not impact the security of K
Users will only be granted the minimum access needed to perform their official role and segregation of duties will be enforced.
KADA leverages vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC):
All corporate devices are centrally managed and are equipped with mobile device management software and anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage.
We use Microsoft Intune software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.
K uses Microsoft to secure our identity and access management. We enforce the use of phishing-resistant authentication factors.
K employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment.
Further access must be approved according to the policies set for each application.
K provides comprehensive security training to all employees upon onboarding and annually.
In addition, all new employees attend a mandatory live onboarding session centered around key security principles. All new engineers also attend a mandatory live onboarding session focused on secure coding principles and practices.
The KADA team is supported by Security experts who regularly conduct briefings with employees to inform them of important security updates and emerging threats.
Deploy and start seeing your data ecosystem in less than an hour