Security at Qohash

Data security is at the heart of Qohash’s mission: our customers trust us with their most sensitive information. We build security into every part of our business so you can rest assured that your data is safeguarded.

Compliance program

SOC 2 Type 2

SOC 2 is an audit report from the AICPA that focuses on controls relevant to security, availability, and confidentiality at a service organization. Our SOC 3 is report also available.

Available upon request – ask our sales team for details.

ISO 27001

ISO 27001 is a global standard for managing information security, ensuring organizations systematically protect their sensitive information.

Available upon request – ask our sales team for details.

ISO 27701

ISO 27701 is an extension of ISO 27001 specializing in privacy management (PII handling and GDPR compliance)

Available upon request – ask our sales team for details.

ISO 42001

ISO 42001 is an international standard that specifies requirements for establishing, implementing, and maintaining an AI Management System (AIMS).

Available upon request – ask our sales team for details.

Security by design

Bring Your Own Encryption (BYOK)

Qostodian tracks data, not files. Data is identified by its hash, and none of it leaves your premises without being encrypted using keys that only you control.

Tenant isolation

Your data and resources are completely separated from other customers in every data store. We prioritize strong isolation to ensure the protection of your data, reducing any risk of unauthorized access or disruption from other tenants.

Single Sign-On (SSO)

Every tier includes SSO access, allowing users to log in using their existing corporate identity. Multi-factor authentication (MFA) is always enforced.

Role-Based Access Control (RBAC)

RBAC allows access levels to be based on specific roles, ensuring users have the appropriate permissions for their responsibilities. Qostodian also offers the ability to create custom roles, helping you to align with the principle of least privilege.

Directory integration with automatic synchronization

Qostodian simplifies user management by integrating with Azure Active Directory (AD). User identities are synchronized, reducing the administrative burden of removing inactive users.

IP whitelisting

Access to each tenant on the platform is always restricted to a list of known IP addresses, helping you to reduce your attack surface and prevent unauthorized access.

Audit trails

Comprehensive activity logs capture sensor management, administrative, and platform configuration changes. By default, these logs are protected against deletion to ensure non-repudiation. You can easily retrieve audited events from a GraphQL API for integration with your log management tools.

Strong security for peace of mind

Qohash secures its own operations through a standards-based framework covering development, deployment, and maintenance, backed by continuous investment in industry-leading practices and team training.

A security culture

Qohash prioritizes resilience as a core value, fostering a culture of awareness, responsibility, and vigilance among all team members. We promote security best practices and ensure that security considerations are embedded in every aspect of our operations.

DevSecOps

We follow a robust DevSecOps approach, integrating security practices into the entire software development lifecycle. This enables us to identify and address security vulnerabilities early on, reducing the risk of potential threats and ensuring the security of our product.

External verification

To ensure the effectiveness of our security measures, we engage in regular external verification processes. We collaborate with independent security auditors and experts who evaluate our systems, processes, and controls to validate the security of the platform.

Continual improvement

Qohash is committed to a process of continual improvement to enhance the security of our products and maintain a proactive stance against emerging threats. We regularly assess our security practices, conduct risk assessments, and stay up to date with the latest security trends to ensure that our customers’ data and systems remain protected.

Ready to see
Qohash in action?