Security Portal

Start your security review
Search items
ControlK

Overview

Security is one of Kameleoon's core values, as such we are committed to maintaining a strong posture based on security by design and defense in depth. Kameleoon has appointed a Chief Information Security Officer to manage this security program, alongside the cybersecurity team members.

Our security program aligns with the International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) 27001 as well as the [NEST Framework] (https://www.nist.gov/cyberframework) to implement our policies, procedures and controls.

Our activity relevant to data transfer can be described as "Collection, storage and analysis of raw data to provide aggregated (or computed) data to analyse experiments and personalizations results."

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
ISO 27001 Logo
ISO 27001
ISO 27001 SoA Logo
ISO 27001 SoA
PCI DSS Logo
PCI DSS
SOC 2 Logo
SOC 2
Start your security review
Other Reports
Pentest Report
SOC 2 Report
GDPR
ISO 27001
ISO 27001 SoA
PCI DSS
SOC 2
CAIQ
Other Self-Assessments
BC/DR
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
BYOD Policy
Data Classification Policy
Data Sanitization Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Network Security Policy
Other Policies
Physical Security
Risk Management Policy
Software Development Lifecycle
Vulnerability Management Policy
Corporate insurance

Risk Profile

Data Access LevelRestricted
Impact LevelModerate
Recovery Time Objective12 hours
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

Network Diagram
Other Reports
Pentest Report
View more

Self-Assessments

CAIQ
Other Self-Assessments

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Code Analysis
Credential Management
Software Development Lifecycle
View more

Data Privacy

Cookies
Data Breach Notifications
Data Into System
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
BC/DR
Data Center
View more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management

Network Security

Firewall
IDS/IPS
Security Information and Event Management
View more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View more

Security Grades

SecurityScorecard
Kameleoon
Security Scorecard A grade
CryptCheck
Web Application
ImmuniWeb
Web Application
View more

If you need help using this Trust Center, please contact us.

Powered bySafeBase Logo