Cookie Consent by TermsFeedKeemut | Security

Keemut Security

Security On The Cloud


At Keemut, data and application security are at the top of our priority list. We have implemented industry level best practices and standards when it comes to security and privacy of user data. Some of the tools we are using are mentioned below.



Cloud First Approach


We use multiple different cloud services including Amazon Web Services (AWS) where monitoring and encryption tools are used to secure data.
There are network level filters that are across all servers and help circumvent any unauthorized intrusions.



Threat Monitoring


Our Application is secure against common vulnerabilities like DDOS, XSS, CSRF, Clickjacking etc. For more info, Click Here

Application vulnerabilities tools are running in the background continuously. This will add some slowness to the application but is essential.



Firewall


We use Application Firewalls to prevent malicious or unauthorised intrusion. This is monitored continuously with multiple AI tools.



Login Protection


We use encryption for usernames and passwords, along with monitoring tools, and more. For example, we protect against account sharing so that only one user can log into your account at one time.

2FA


We use SSL/TLS protocols to make sure all data is communicated over a Secure and Encrypted Network We Use AES-256 for any encryption required. Your access tokens are stored safely in an encrypted database. We have an added layer of 2 Factor Authentication to protect your account from unauthorized access.

Malware Detection


All of our servers are regularly run through malware scans to ensure that all our servers are safe and secure.



Tesla API security

More Added Often

We don’t go too deep into what we are doing, but this should give you a high-level overview of some of the things we are doing to ensure your data is safe. You can take a look at the document below that lists the current practices being followed by us.