FEATURES

Security

Enterprise-grade security to keep your data safe and secure

ISO 27001 certified


Our priority is to keep our customers’ data safe. Our security team invests resources to maintain strict security and privacy standards, formalized in our ISO 27001 certification.

Get in touch to learn more about our ISO 27001 certification.

Rigorous access controls


Koordinates supports a comprehensive role-based access control architecture to allow fine-grained permissions to be configured for datasets.

Access can be given and revoked for individuals, team members, groups, or the public at large.

Data hosted on AWS


Koordinates uses Amazon Web Services for infrastructure hosting of our production applications.

AWS are a world-class infrastructure host, and have attained all common security certifications for data centers and infrastructure. Read more about the AWS compliance certifications and approach to security and availability here.

Single Sign On


Koordinates supports Single Sign On (SSO) for ease of centralised identity management for your organisation.

We support MS Entra (Azure AD), Okta, Google Workspaces, and other OAuth2/SAML2 identity providers on Enterprise subscriptions.

Additional security features of Koordinates

Security conscious development practices

Koordinates’ developers follow industry standard OWASP best practices, with comprehensive automated testing and code review part of our standard development methodology.

Extensive enterprise experience

Koordinates has served enterprise customers in government, defense, and multi-national companies for over a decade, and has been assessed against the New Zealand Government Cloud Computing Risk and Assurance Framework.

Encryption

All end-user interactions with Koordinates sites, web services, and support are encrypted using TLS.

Regular external audits

Koordinates undergoes annual security reviews including penetration and vulnerability tests. Reviews and testing are conducted by independent third party security providers.

Security conscious development practices

Koordinates’ developers follow industry standard OWASP best practices, with comprehensive automated testing and code review part of our standard development methodology.

Extensive enterprise experience

Koordinates has served enterprise customers in government, defense, and multi-national companies for over a decade, and has been assessed against the New Zealand Government Cloud Computing Risk and Assurance Framework.

Encryption

All end-user interactions with Koordinates sites, web services, and support are encrypted using TLS.

Regular external audits

Koordinates undergoes annual security reviews including penetration and vulnerability tests. Reviews and testing are conducted by independent third party security providers.

Public Data on Koordinates

Browse

Learn more about how Koordinates can help you get more from your GIS investment

Sign up for free or talk to us about a tailored solution for your needs.