Security
This describes the technologies, procedures, and policies for protecting our infrastructure and your data.
This describes the technologies, procedures, and policies for protecting our infrastructure and your data.
At Kadanza, we take data security very seriously.
Data security is an integral part of our global operations. In fact, information security is a vital part of our platform and organization, and it is ingrained in our people, processes, and technologies.
Our approach is straightforward: every employee is properly trained on the use of our different information classification levels to make sure all data is handled safely. They are responsible for information security, including protecting:
We further ensure the safety of customer data by restricting employee access to our production environment. Access to any Kadanza installation besides our own is managed via a Just-In-Time (JIT) principle. In case we have to provide support and access a customer’s installation.
As a cloud company, we’ve also invested heavily in:
Moreover, our program is subject to annual independent audits for compliance and industry standards certifications, ensuring that our program meets and even exceeds all security requirements.
We make use of four different information classification levels:
1. Public
Making the information public cannot harm the organization in any way. The information is publicly available.
2. Internal use
Unauthorized access to information may cause minor damage and/or inconvenience to the organization. This information is available for all employees and selected third parties that need access to the information to perform their tasks.
3. Restricted
Unauthorized access to information may cause serious damage and/or inconvenience to the organization. This information is available only to a limited group of individuals in the organization and a restricted number of external parties.
4. Classified
Unauthorized access to information may cause catastrophic (irreparable) damage to business and/or to the organization's reputation. This information is available only to a limited group of individuals in the organization
Whenever you notice a security issue, or you have any security-related questions, don’t hesitate to contact us via infosec@kadanza.com. Our security team will get back to you as soon as possible.
At Kadanza, we are concerned about the security and integrity of our network systems, databases and the protection of personal data. And while we try to create the most secure platform possible, weak spots might still be possible.
Weak spots can be discovered in two ways: you accidentally run into something during normal use of a digital environment, or you explicitly make an effort to find a weak spot.
We monitor our network ourselves. This means that there is a good chance that a scan will be picked up, that our security staff will investigate this and that unnecessary costs may be incurred.
We also realise that, despite the best intentions and care, a vulnerability may occur in
the security of systems. If you find a weak spot in one of our systems, we would very much like to hear about it. We can then resolve the vulnerability.
We would like to work with you to better protect our customers and our systems.
We ask you:
We guarantee you:
Unfortunately, it is not possible to rule out legal action against you in advance. We want to be able to weigh each situation separately. We consider ourselves morally obliged to report the problem if we suspect that the weakness or data is being misused, or that you have shared knowledge about the weakness with others. You can rest assured that a chance discovery in our online environment will not lead to a report.
Kadanza does not have an active bounty program in place. As a thank you for your help, we offer our gratitude and credit your name in our release notes for every report of a security problem that is not yet known to us. In case a new critical vulnerability was discovered, we can consider a reward, which is determined by our InfoSec team on a per case basis. The size of the reward will be based on the severity of the leak and the quality of the report.
We strive to resolve all problems as quickly as possible, keep all parties involved
informed and we would like to be involved in any publication about the problem after it has been resolved.
Don’t worry! We also offer a more extensive build-to-order solution with even more power, storage and capabilities.
Just ask us about our PRO model. Or check out our custom integrations to see how a tailored Kadanza setup can solve your challenges.