Secure system processes are at the core of our product and services. We safeguard your source code and data with strong encryption, firewalls, secure email, and proactive 24/7 system monitoring.
ISO27001 DATA SECURITY
Our data centers adhere to the highest security standards and security policies. Security is always our first priority.
Data is secured at all times, both in transit and at rest with AES256/512 encryption.
SECURE UPLOAD FOLDER
If you prefer manual upload, our upload folder system also provides you with a secure way to deposit your source code.
DEPOSIT AUDIT / LOGS
Review the deposit history on your account.
GDPR COMPLIANCE (ADD ON)
If your deposits contain GDPR related data you will probably need a data processing agreement and related services.
HIPAA COMPLIANCE (ADD ON)
If your deposits contain HIPAA related data you will probably need a data processing agreement and related services.
We provide different security capabilities and services that help you increase privacy and control network access. These include:
network firewalls and web application firewall capabilities;
encryption in transit with TLS across all services;
connectivity options that enable private, or dedicated, connections from your office or on-premises environment;
We utilize encryption to add an additional layer of security to your data at rest in the cloud, using scalable and efficient encryption features. They include:
flexible key management;
encrypted message queues;
You can use a combination of services to implement an in-depth defense strategy and thwart DDoS attacks. Our services are designed with an automatic response to DDoS, which helps minimize time it takes to mitigate and reduce impact.
We operate compliant to ISO27001 guidelines.
Cloud Security Alliance Controls (CSA)
ISO 9001 - Global Quality Standard
ISO 27001 - Security Management Controls
ISO 27017 - Cloud Specific Controls
ISO 27018 - Personal Data Protection
PCI DSS Level 1 - Payment Card Standards
SOC 1 - Audit Controls Report
SOC 2 - Security, Availability, &
SOC 3 - General Controls Report
Our data center partners provide you with multi-leveled security and practices.
Business Continuity & Disaster Recovery
Monitoring & Logging
Surveillance & Detection
Operational Support Systems
Goverance & Risk
What is the primary focus of Codekeeper's security measures?
How does Codekeeper protect my source code?
What type of encryption does Codekeeper use to secure my source code?
Where is my source code stored?
How does Codekeeper handle access control for my source code?
Can I trust Codekeeper with my sensitive data?
Does Codekeeper conduct regular security audits and updates?
How does Codekeeper handle potential security breaches?
Who can I contact if I have a question that hasn’t been answered here?
Show more questions + Show less questions -
These companies already secured their software continuity.
Will you start today?
Software escrow secures the source code needed to recover if a supplier is no longer able to provide access or support the software you need for your business operations with an independent 3rd party.Get Started
Best price guaranteed
No hidden costs
Introduction to Software Escrow: A Guide
Learn how software escrow helps you mitigate risks and ensure your mission-critical systems remain unaffected through any circumstance.Download Guide