How secure is it to use your data? Follow
At Ekata, respecting the individual rights of our data subjects is always top of mind. We provide identity verification and fraud prevention services worldwide to protect consumers and their identities. Our security and privacy team has been working for years to secure personal data and ensure individual rights, and will continue to do so.
Ekata has been a trusted name in identity verification and fraud prevention for years, and we take that trust seriously. Long before security and privacy buzzwords entered the mainstream, we based our first information security program on ISO 27001:2005. Today, we still take a risk-based approach to information security, which is to say a practical one: we protect systems and data according to their sensitivity and exposure to threats. Our security and risk assessments are provided by third-party PCI Qualified Security Assessor companies to ensure an unbiased approach. And because we’re a Data as a Service provider, we also formally document our compliance with the AICPA Service Organization Controls (SOC) 2 principles of security, confidentiality, availability, and privacy.
And while we cannot publish the specifics regarding how our platform runs internally, we can say that it is of the utmost importance that our data and the data of our customers is kept safe. We have a team of engineers dedicated to our data security, and they have a built Ekata API to run over a secure TLS encrypted interface that ensures our customer queries and responses are secured end to end.
If you have any questions or for more information, contact us at email@example.com.