Security and Compliance

Our content filtering platform is architected to ensure your data and privacy
are protected at every layer, applying robust security measures,
with adherence to leading industry compliance standards.

Our Core Security Principles


Our security framework is built on a foundation of data protection, access control, and network security. Deployments can be self-hosted in your cloud environment, hosted on the Akeia Cloud (powered by AWS), or a combination of the two.


Encryption & Data Security


  • Encryption: All data is encrypted both in transit using TLS 1.3
  • Multi-Factor Authentication (MFA): We use MFA and role-based access controls (RBAC) to ensure that only authorised personnel can access sensitive data.

Network and Infrastructure Security


  • Interception Proxy: Our solution uses an intercepting proxy to securely inspect and filter content.
  • Scalable Architecture: We leverage best practice within AWS to ensure our platform is secure, resilient, and highly available.



Security Certifications & Standards


We are committed to meeting and exceeding global security and privacy standards,
providing you with peace of mind.

Cyber Essentials

We are working towards Cyber Essentials certification, demonstrating our commitment to fundamental security controls and best practices.

Active Review

ISO 27001:2022

We are working toward ISO 27001:2022 certification to demonstrate our comprehensive information security management system.

Active Review

Privacy Shield

We adhere to Privacy Shield principles for secure international data transfers.

COMPLIANT

Cloud Security Alliance

Our infrastructure follows Cloud Security Alliance best practices for secure cloud operations.

COMPLIANT

Security Operations & Monitoring


  • Secure Development Lifecycle: We embed security-by-design principles into every stage of our development process.


Security Contact


For security-related inquiries or to report security issues:

  • Email: security@akeia.ai
  • Response Time: We aim to respond to security inquiries within 24 hours
  • Vulnerability Disclosure: We welcome responsible disclosure of security vulnerabilities