Skip to content

Keyo utilizes enterprise-grade best practices to protect our customers’ data.

Keyo uses Drata’s automation platform to continuously monitor 100+ internal security controls across the organization against the highest possible standards. Automated alerts and evidence collection allows Keyo to confidently prove its security and compliance posture any day of the year, while fostering a security-first mindset and culture of compliance across the organization.

soc2-i
SOC 2

SOC 2 is woven into Keyo’s daily life

icon

Employee Trainings

Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.

icon

Penetration Tests

Keyo works with industry leading security firms to perform annual network and application layer penetration tests.

icon

Secure Software Development

Keyo utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

icon

Data Encryption

Data is encrypted both in-transit using TLS and at rest.

icon

Vulnerability Disclosure Program

If you believe you’ve discovered a bug in Keyo’s
security, please get in touch at security@keyo.co.
Our security team promptly investigates all
reported issues.

BLOG

Blog

Every week we publish a research piece that explores identity, biometrics, privacy, and some of the largest questions that the industry faces.