Hosting:
Kraken is hosted on Amazon Web Service (AWS) in the North Virginia region. Full details on the AWS security measures can be found here: https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf
Physical Security:
For full details of AWS physical security see: https://aws.amazon.com/compliance/data-center/data-centers/
Encryption:
All data is encrypted in transit both within the Kraken network and between you and the application using TLS/SSL. The encryption is based on RSA 256 bit keys.
Infrastructure Scans:
Threat detection scans are running constantly and any identified issues are addressed based on the risk rating produced by the scans.
Firewalls:
Firewalls exist at both the network layer via virtual private cloud (“VPC”) and on each host. The VPC serves to isolate Kraken servers from the rest of the AWS network.
AWS Security Groups (“AWS SG”) and VPC Access Control Lists (“VPC ALC”) provide both inbound, outbound and internal content policies.
Audit Log:
Infrastructure actions and performance is logged and available for audit, security and compliance purposes. Various alerts are set up on the logging in order to provide early response to incidents.
Qlik AutoML (automated machine learning) brings AI-generated machine learning models and predictive analytics
directly to your organization’s larger community of analytics users and teams, in a simple
With over 2.5 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.