Security Overview
At Kinetic Data, safeguarding customer data is our utmost priority. We recognize the responsibility that comes with our customers’ information and have implemented robust security measures to protect against emerging threats.
Our commitment to security is reflected in our practices, which ensure that both our data and our customers’ data are securely managed. By aligning our security goals with that of the industry’s best practices, we strive to maintain the highest standards of data protection and integrity, fostering a trusted environment for all.
Shared Responsibility Model
Kinetic Data employs a shared responsibility model to ensure the security of the Kinetic Platform. Our platform offers a dynamic data model, allowing customers to add custom fields and properties to Kinetic objects and store various types of data. Kinetic Data is responsible for providing a secure and robust platform infrastructure. However, as data controllers, customers are responsible for how they use the platform and the type of data they store. This collaborative approach ensures comprehensive security, leveraging both our secure platform and our customers’ responsible data management practices.
Access Control and Organizational Security
Personnel
All employees and contractors sign confidentiality agreements and complete background checks before accessing our code and data. We emphasize security awareness and best practices through comprehensive training. Remote server access is restricted to essential personnel via VPN with two-factor authentication, and all administrative access is monitored and logged.
To secure our devices, we centrally manage all company devices using industry standard tools to enforce the following: full disk encryption, anti-virus policies, EDR monitoring, patch compliance, and password policies.
Penetration Testing
Our software has been running for over a decade in some of the world’s most secure environments, including the United States Department of Defense. Our customers regularly test the security of our application and report findings so they can be quickly remediated. Kinetic Data is in the process of obtaining our own penetration testing for our SaaS offering (kinops) and will share the findings upon request after signing a non-disclosure agreement.
Dedicated Teams
Our Platform Operations and Security teams manage access/identity, network security, and log file management. Their responsibilities include:
- Managing our overarching security program
- Reviewing code and infrastructure changes for security compliance
- Operating our infrastructure, including logs, monitoring, and authentication
- Designing and testing incident response processes
- Responding to security alerts
- Coordinating external audits and certifications
- Monitoring anomalous activity
- Collaborating with external security teams on vulnerability testing
- Implementing app-level encryption and data protection tools
Audits, Security Policies, and Standards
Our internal system monitors and blocks suspicious activities. Alerts for excessive resource use are escalated to our Ops team for manual investigation. Our products run on a dedicated network secured with firewalls and continuous monitoring. Our infrastructure is regularly updated with security patches.
Data Protection and Privacy
Data Location
All customer data is hosted within the United States, and we utilize Amazon Web Services (AWS) as our hosting platform. Customer files are encrypted and stored using modern techniques to ensure security, redundancy and reliability.
Customer Data
At Kinetic Data, we prioritize the privacy and security of our customers’ data. We are committed to ensuring that customer data is used solely for the purpose of maintaining and operating our platform. We do not use customer data for any other purposes, nor do we sell or share it with third parties. Our focus is on providing a secure and reliable service, and we take all necessary measures to protect and respect the confidentiality of your information.
Encryption
We offer encryption in-transit and at-rest for our platform, whether we are hosting it for you, or if our customers are managing the infrastructure either in one of their public cloud accounts, or in one of their data centers. For kinops, all data in-transit (either internally or externally) and at rest uses industry standard and best practice encryption such as AES/SHA 256. Further, we are actively in the process of ensuring that each Cryptographic Module in use within and relied on by the platform is FIPS Compliant.
Physical Security
Our servers are hosted on AWS and are protected by biometric locks and continuous surveillance. Only authorized personnel have access, supported by 24/7 onsite staff.
Law Enforcement
Kinetic Data will only comply with law enforcement requests accompanied by a court order. We reject requests lacking proper legal authorization and inform customers of such requests whenever legally permitted.
Data Deletion
Upon cancellation, customer content becomes inaccessible immediately and will be permanently deleted upon request.
Incident Management and Disaster Recovery
We have a fully documented Incident Management and Backup and Recovery plan. Kinetic Data uses a distributed database that is replicated across multiple data centers to prevent data loss. Additionally Databases are backed up every 24 hours, with file backups stored off-site. Our dedicated teams manage incident response, ensuring prompt customer communication and collaboration.
Conclusion
Security is integral to trust. Over the years, we’ve earned the trust of numerous organizations worldwide and remain committed to maintaining that trust through continuous vigilance and robust security practices.