We take security seriously here at Kronologic. Our team works hard to protect your organization.
Gaining your trust is a point of pride, we preserve it by continuously exceeding industry standards.
|Siloed User Data Architecture||☑|
|SOC 2 - Type 1 & 2 Compliance Roadmap||☑|
|MFA Required Production Access Requirement||☑|
|Best in Class Data Storage||☑|
|RPO < 1 Hour||☑|
|RPO & RTO < 1 Hour||☑|
|Encrypted Traffic in Transit & Sensitive Data at Rest||☑|
|Hardware Based Encryption||☑|