Security

Security at Captiv8

Captiv8 is constantly monitoring and upgrading our platform and infrastructure to meet and exceed the latest best practices in security and controls. Including pursuing SOC2, AWS Foundational Security Best Practices, CIS AWS Foundations Benchmark, OWASP Best Practices, and more.

Data Security

Captiv8 encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.

Application Security

Captiv8 regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, the running application, and the deployed environment.

Captiv8 also uses high-quality static analysis tooling provided by GitHub Advanced Security, such as Dependabot to secure our product at every step of the development process.

Infrastructure Security

Captiv8 uses Amazon Web Services to host our application. We fully use the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.