FEATURES
Security
Enterprise-grade security to keep your data safe and secure
ISO 27001 certified
Our priority is to keep our customers’ data safe. Our security team invests resources to maintain strict security and privacy standards, formalized in our ISO 27001 certification.
Get in touch to learn more about our ISO 27001 certification.
Rigorous access controls
Koordinates supports a comprehensive role-based access control architecture to allow fine-grained permissions to be configured for datasets.
Access can be given and revoked for individuals, team members, groups, or the public at large.
Data hosted on AWS
Koordinates uses Amazon Web Services for infrastructure hosting of our production applications.
AWS are a world-class infrastructure host, and have attained all common security certifications for data centers and infrastructure. Read more about the AWS compliance certifications and approach to security and availability here.
Single Sign On
Koordinates supports Single Sign On (SSO) for ease of centralised identity management for your organisation.
We support MS Entra (Azure AD), Okta, Google Workspaces, and other OAuth2/SAML2 identity providers on Enterprise subscriptions.
Additional security features of Koordinates
Security conscious development practices
Koordinates’ developers follow industry standard OWASP best practices, with comprehensive automated testing and code review part of our standard development methodology.
Extensive enterprise experience
Koordinates has served enterprise customers in government, defense, and multi-national companies for over a decade, and has been assessed against the New Zealand Government Cloud Computing Risk and Assurance Framework.
Encryption
All end-user interactions with Koordinates sites, web services, and support are encrypted using TLS.
Regular external audits
Koordinates undergoes annual security reviews including penetration and vulnerability tests. Reviews and testing are conducted by independent third party security providers.
Security conscious development practices
Koordinates’ developers follow industry standard OWASP best practices, with comprehensive automated testing and code review part of our standard development methodology.
Extensive enterprise experience
Koordinates has served enterprise customers in government, defense, and multi-national companies for over a decade, and has been assessed against the New Zealand Government Cloud Computing Risk and Assurance Framework.
Encryption
All end-user interactions with Koordinates sites, web services, and support are encrypted using TLS.
Regular external audits
Koordinates undergoes annual security reviews including penetration and vulnerability tests. Reviews and testing are conducted by independent third party security providers.