Komo recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Komo so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Founded in 2014
Trusted by
Continuously monitored
Acceptable Usage Policy
Policy
Access Control Policy
Policy
SDLC Procedure
Policy
HR Security Procedure
Policy
Incident Management Policy
Policy
Encryption Policy
Policy
Subprocessors
GCP
IT infrastructure
United Stat...
Australia
+1 more
Cloudflare
Hosting Providers
United Stat...
Australia
Datadog
IT infrastructure
United States of America
HubSpot
Sales
United States of America
Google Workspace
IAM providers
United States of America
Xero
Finance
Australia
United Stat...
Your Data
Want to access or modify your data?
Send a request to request access, updates, migration, or deletion, and we'll get it done for you.