Secure system processes are at the core of our product and services. We safeguard your source code and data with strong encryption, firewalls, secure email, and proactive 24/7 system monitoring.
ISO27001 DATA SECURITY
Our data centers adhere to the highest security standards and security policies. Security is always our first priority.
END-TO-END ENCRYPTION
Data is secured at all times, both in transit and at rest with AES256/512 encryption.
SECURE UPLOAD FOLDER
If you prefer manual upload, our upload folder system also provides you with a secure way to deposit your source code.
DEPOSIT AUDIT / LOGS
Review the deposit history on your account.
GDPR COMPLIANCE (ADD ON)
If your deposits contain GDPR related data you will probably need a data processing agreement and related services.
HIPAA COMPLIANCE (ADD ON)
If your deposits contain HIPAA related data you will probably need a data processing agreement and related services.
We provide different security capabilities and services that help you increase privacy and control network access. These include:
network firewalls and web application firewall capabilities;
encryption in transit with TLS across all services;
connectivity options that enable private, or dedicated, connections from your office or on-premises environment;
We utilize encryption to add an additional layer of security to your data at rest in the cloud, using scalable and efficient encryption features. They include:
data encryption;
flexible key management;
encrypted message queues;
You can use a combination of services to implement an in-depth defense strategy and thwart DDoS attacks. Our services are designed with an automatic response to DDoS, which helps minimize time it takes to mitigate and reduce impact.
We operate compliant to ISO27001 guidelines.
Datacenter certifications:
Cloud Security Alliance Controls (CSA)
ISO 9001 - Global Quality Standard
ISO 27001 - Security Management Controls
ISO 27017 - Cloud Specific Controls
ISO 27018 - Personal Data Protection
PCI DSS Level 1 - Payment Card Standards
SOC 1 - Audit Controls Report
SOC 2 - Security, Availability, &
Confidentiality Report
SOC 3 - General Controls Report
E-book
Download our guide to learn more about the measures Codekeeper takes to ensure utmost security for your source code escrow.
DOWNLOAD FREE GUIDEOur data center partners provide you with multi-leveled security and practices.
Secure Design
Business Continuity & Disaster Recovery
Physical Access
Monitoring & Logging
Surveillance & Detection
Device Management
Operational Support Systems
Infrastructure Maintenance
Goverance & Risk
E-book
Learn how software escrow helps you mitigate risks and ensure your mission-critical systems remain unaffected through any circumstance.
Software escrow secures the source code needed to recover if a supplier is no longer able to provide access or support the software you need for your business operations with an independent 3rd party.