Our mission is to empower people to tell their stories with media by using iconik as a safe haven in the cloud.
Each part of iconik was designed with scalability and security in mind. Iconik is devoted to constantly testing and proving that our security measures will protect your data in the cloud.
All data in iconik is encrypted both in transit using TLS 1.2+ and at rest using AES-256 encryption.
Iconik forces usage of HTTPS, HTTP2 or WSS, and only uses TLS or QUIC.
Iconik complies with the latest General Data Protection Regulation (GDPR) to give you control over your personal information.
The iconik Storage Gateway is designed to be firewalled so that no incoming connection can be established with on-premise storage.
Machine Intelligence proactively supports monitoring and responding to intrusion attempts.
Production environments are internally restricted to a handful of engineers and separated from testing and other environments.
Iconik logs all API calls and operations in iconik to be audited in a secure logging environment.
All passwords in iconik are hashed and salted, making them nearly impossible to decode.
Regular backups and penetration testing are an important part of our standard operation policy.
We designed iconik’s system to protect against unauthorized access with the help of multiple external cyber security experts who have tested iconik’s systems. These external experts used methodologies and standards like NIST SP800-115, PTES, OWASP and Offensive Security to evaluate iconik’s system security and to help ensure its effectiveness.
All product design is reviewed to ensure it complies with security requirements.
Security tools run automatically to detect vulnerabilities for new code.
We test all products extensively in the testing deployment phases.
Iconik operates its network on Amazon AWS and Google Cloud, global cloud leaders who provide leading edge security. This provides iconik with Denial of Service Protection, and best in class operational and physical security.
We use Google Clouds Best Practices which include; Identity & access management, Multifactor authentication, Automated Security Scanning, Application Firewalls and Intrusion Detection, and Denial of Service Attack Mitigation.
By using iconik’s metadata management, you can limit which information is shown to each user. With this, you can show users information that’s relevant to them or restrict access to sensitive information.
The right people should be able to find and use the media they need, and some others shouldn’t see it all.
Every part of iconik is rights managed with granular control over user and group access and what they are allowed to do with the media they access.
Is there important information users should know before editing or sharing using your media? Iconik warning labels can be used to let them know. You can create warnings around usage restrictions, rights expirations, or anything else.
When you want to be absolutely sure that content cannot be shared or downloaded, you can rest easy by blocking those actions from happening.
Iconik was built for the cloud, but there’s nothing fluffy about our security features that keep your media safe. Your media is your story, and iconik will protect it.