Data Storage and Security

We built Cloudockit with a top priority on security.  All documents are generated in memory, in an isolated process, and no sensitive information is stored on disk.

With a smooth integration, we are using the latest and best security practices to ensure a secure experience.

Try it for free
all credentials are secure and never recorded
documentation icon

Why Security Matters?

Security and privacy have transitioned from being legal risk management and compliance topics to drivers of innovation and a requirement for business survival.  As a company, we put security and privacy first to have a strategic competitive advantage that increases over time.  We think and design the architecture and development lifecycle of Cloudockit to be fully secure.

Security is Key for Every Platform

data set stay in the country where the cloud server is based

What About Data Sovereignty

Cloudockit is deployed in multiple data centers to ensure we respect data sovereignty, which means that if you are in USA, your data will stay in the USA and if you are in UK, your data will stay in UK.

We do Not Keep Your Credentials and Documents

When generating your reports and diagrams, you have the option to select your own storage environment. All documents are only generated in memory and streamed directly into your own storage.

Once the documentation has been streamed to your side, the temporary token used to connect to your environment is immediately and permanently deleted.

Easily duplicate environment
microsoft and partner network icons

Reviewed and Approved by Multiple Independent Organizations

Cloudockit is approved on multiple software marketplaces including Azure App Source, Azure Active Directory Marketplace, Login with Amazon and Google Sign-In.

Additionally, we are proud to say that all Microsoft Services Consultants around the world are now using Cloudockit.

Cloudockit Desktop to End All Your Remaining Questions.

Not convinced, Cloudockit Desktop generates the exact same output as the Cloudockit SaaS version, but everything will run locally.

Just define your settings on our web interface and specify your credentials locally on the Windows Application to get things started.

look up on the scheduling feature

Which Security Practices are Implemented at Cloudockit?

The Cloudockit security & development team is highly focused on developing a secured product. Here are some of the key elements (not exhaustive list) that are enforced at Cloudockit:

  • Required communication encryption is with TLS1.2 enforced
  • Storages used are encrypted at rest
  • Firewall deployed for all components
  • Queue messages are software-encrypted on top of the queue encryption
  • GDPR-proof : beta environments are not using production data
  • Continuous testing to ensure code quality.
  • Our development team is trained for security best practices and a security committee is regularly reviewing those practices
data set collection

Give it a try.

It’s free and it takes less than 5 minutes.

Try it for free