Komo recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Komo so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Founded in 2014
Here are the subprocessors that Komo uses to process data in its infrastructure and business operations.
GCP
IT infrastructure
United Stat...
Australia
Belgium
Cloudflare
Hosting Providers
United Stat...
Australia
Datadog
IT infrastructure
United States of America
HubSpot
Sales
United States of America
Google Workspace
IAM providers
United States of America
Xero
Finance
Australia
United Stat...
Stripe
Finance
United States of America
PostHog
Analytics
United States of America
Postmark
IT infrastructure
United States of America
Twilio
IT infrastructure
United States of America
Sprinto
Security Software
United States of America
Grafana Labs
Infra Monitoring Providers
Australia
United Stat...
Belgium