Klu Security

At Klu, we prioritize the security and privacy of our users. We understand the trust you place in us to protect your data, and we are committed to upholding that trust. Below, you can find details about our security practices.

Data Encryption

To further protect your data, we use a variety of encryption methods to secure it both at rest and in transit.

Transit
Encryption

All data transferred between our users and our services is encrypted using industry-standard encryption protocols.

Encryption
at Rest

We ensure that all stored data, whether it's user profiles, application data, or logs, are encrypted while at rest. This includes our primary databases, backups, and any replicas.

Search Index Encryption

The indexes we use to facilitate search within our platform are encrypted. We take extra measures to ensure that even this metadata remains confidential and secure.

📁
Data Indexing and Keyword Extraction

During the indexing process, we extract keywords from the content to provide efficient keyword search capabilities. This enables our users to quickly find the information they need.

Compliance and Certifications

Klu is in the process of obtaining its SOC 2 certification. This certification attests to the fact that a company has met specific criteria related to its system's security, availability, processing integrity, confidentiality, and privacy.

🔐
Commitment to Security

We continually evaluate and improve our security framework. This is not a one-time effort but a continuous process of enhancement. We understand that in the our age, security needs are evolving, and we are dedicated to staying ahead of potential threats.

Designed to protect your data.

If you have any additional questions regarding Klu security, feel free to reach out to us.