Security at Knak

Enterprise-grade security and compliance. Safeguard your data with robust protection, privacy controls, and industry-leading standards.

Visit our Trust Center
gradient bg
soc2 badge

SOC 2 Type II

CERTIFIED

Trusted by

  • Amazon logo
  • Google logo
  • Meta logo
  • Palo Alto Networks logo
  • Stripe logo
  • Databricks logo

Protecting Your Service Data

  • icon

    Compliance Reports

    Continuous SOC 2 control testing and annual audits conducted by independent third-party. Reports available in our Trust Center.

  • icon

    Regular Pentesting

    Knak performs bi-annual pentests on the application and cloud infrastructure. Reports available in our Trust Center.

  • icon

    24/7 Monitoring

    We leverage a 24/7 MDR service to monitor logs and escalate any findings to our team.

  • icon

    Vulnerability Scanning

    Knak has vulnerability scanning baked into the development process, automatically scanning code before it's pushed to production. Any findings are tracked and remediated within our SLAs.

  • icon

    Third-Party Risk Management

    Vendors are reviewed in accordance with risk levels and sensitivity of data. We ensure our vendors have appropriate security controls in place to handle our customer and organization data, through reviewing security questionnaires and reports.

Least Access Privilege

  • icon

    Access Reviews

    Knak conducts quarterly Access Reviews to regularly check whether access and permission levels are appropriate for applications.

  • icon

    Access Approval

    Access to new applications requires an approval workflow that ensures access is provided with least access privilege and are required for daily responsibilities or a special project.

Product Security

  • icon

    Single Sign On

    Knak offers SSO via SAML 2.0 to all of our customers.

  • icon

    Encryption

    All data is encrypted in transit and at rest using industry standard methods.

  • icon

    Session Timeout

    Sessions within the Knak platform timeout after 30 minutes of inactivity, reducing the risk of attackers hijacking the session.

  • icon

    Granular User Permissions (RBAC)

    The Knak application offers a standard suite of roles along with the ability to create custom roles to meet any business needs. The user permission system grants customers the ability to facilitate role based access control and set guardrails at a variety of levels to ensure least access privilege.

Availability

  • icon

    Uptime and Availability

    Knak is committed to offering transparency around our uptime and current status. See Knak’s realtime and historical uptime here.

  • icon

    Backup & Resiliency

    Backups of data are taken on a daily basis. To support our resiliency efforts these backups are replicated in a geographically distinct region.

  • icon

    Disaster Recovery & Business Continuity

    Disaster Recovery and Business Continuity plans are maintained by Knak and tested annually to mitigate risks when the plans must be put into action.

SOC 2 Type II

Knak has systems audited by an accredited third-party for compliance with SOC 2 Type II in relation to Security, Availability and Availability on an annual basis.

soc2 badge

AI

Knak’s AI Features are opt-in by default.
See more about our approach to AI in our Trust Center.

Visit our Trust Center

Responsible Ethical Disclosure

Knak is committed to guarding the safety and security of our customers.

We follow best practices when it comes to Responsible Ethical Disclosure and receive any security concerns from researchers to security@knak.com.

Ready to see Knak in action?

Get a demo and discover how visionary marketers use Knak to speed up their campaign creation.

Watch a Demo
green sphere graphic used for decorative accents - Knak.com