Org Logo

Komo

Founded in 2014

Compliances (2)

Compliance Logo

SOC 2

In progress

Compliance Logo

ISO 27001

In progress

Trusted by (6)

Trusted By Company Logo

Foxtel

Trusted By Company Logo

QBE

Trusted By Company Logo

iHeart Media

Trusted By Company Logo

JLL

Trusted By Company Logo

ReedPop

Trusted By Company Logo

National Rugby League

Controls

Continuously monitored

Product security (1)

Situational Awareness For Incidents

Data security (5)

Termination of Employment

Multi-factor Authentication

Encrypting Data At Rest

Network security (2)

External System Connections

Data used in Testing

App security (2)

Conspicuous Link To Privacy Notice

Approval of Changes

Endpoint security (3)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security (25)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources (41)

Acceptable Usage Policy

Access Control Policy

SDLC Procedure

Subprocessors (11)

Subprocessor Logo

GCP

United States of America

IT infrastructure

Subprocessor Logo

Cloudflare

United States of America

Hosting Providers

Subprocessor Logo

Datadog

United States of America

IT infrastructure

Subprocessor Logo

HubSpot

United States of America

Sales

Subprocessor Logo

Google Workspace

United States of America

IAM providers