Akka's commitment to security and compliance is paramount leading to attestation or certification of 23 compliance standards and a plan to implement additional controls throughout 2025.
Akka has been deployed into 1000s of mission-critical environments. Neither Akka's software nor our hosted environments, such as services provided at Akka.io, have ever had a security breach. We understand that our customer's trust in our software and in us is critical, and we prioritize researching and supporting new InfoSec initiatives.
Standards







Resources
Policies
Access Control for Customer-Confidential Data Policy
Artificial Intelligence Policy
Business Continuity and Disaster Recovery Policy
Cloud Computing Security Policy
Data Retention and Disposal Policy
Information Security Program Charter
Key Management and Cryptography Policy
Personal Information Handling Policy
Third Party Information Management Policy
Subprocessors
Amazon
Cloudsmith
Docebo
HubSpot
Microsoft
Salesforce
Zoho
Controls
Governance
Conduct and Ethics
Establishes Standards of Conduct
Akka has established Acceptable Use and Corporate Ethics Policies which are both reviewed/updated on an annual basis by Executive Management.
As part of the formal onboarding process, all employees are required to sign indicating their agreement and acknowledgment of the Acceptable Use and Corporate Ethics Policies and re-sign annually thereafter or in the event of any significant revisions.
Customer-Confidential Data
Segregation of Customer Data
Each customer’s data is logically isolated from customer belonging to other customers. This separation is maintained at all times, through all components.
Data Retention and Disposal
Removes Data and Software for Disposal
The company has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed.
Third Parties
Acquisition and Onboarding
Vendor Management Analyzes Threats and Vulnerabilities From Vendors, Business Partners, and Other Parties
A vendor management process has been implemented whereby we perform risk assessments of potential new essential vendors and evaluate the performance of essential vendors on an annual basis. Corrective actions are taken as required based on the results of the assessments.
Customer Support
Customer Support
Customer Support System
We provide a support system that allows users to report suspected defects, complaints, issues, and any other challenge through an appropriate channel.
Reported tickets are addressed by our support staff in a timely manner, as detailed in this policy.
Endpoint Management
Workstations
Workstation Security Patches
All Company Workstations must be patched with the latest operating system updates. Automatic updates must be enabled but can be scheduled so as to not interfere with business.
Infrastructure
Availability and Scalability
System Performance and Capacity Monitoring
The IT team continuously monitors system capacity and performance through the use of monitoring tools to identify and detect anomalies that could compromise availability of the system operations. Incident management process is invoked for confirmed events and anomalies.
Logging and Monitoring
Policy
Intrusion Detection System Utilized
The company uses an intrusion detection system to provide continuous monitoring of the company’s network and early detection of potential security breaches.