Contact

We’d like to hear more from you!


United Kingdom

Name: Gavin Stark
Title: UK Director
Telephone: +44 795 737 7805
Email: gavin.stark@ketosoftware.com
4 Hardman Square, Gartside Street,
Manchester, England, M3 3EB

Finland

Name: Markus Halonen
Title: Project Director
Phone: +358 40 7577861
Email: markus.halonen@ketosoftware.com
Kankurinkatu 4-6
05800 Hyvinkää Finland

Switzerland, Germany and other International Inquiries

Name: Veijo Hytti
Title: CEO
Telephone: +41 79 663 6633
Email: veijo.hytti@ketosoftware.com
Wiesenstrasse 8
8008 Zürich Switzerland


BACK TO TOP

Security & compliance

Our customers are typically large enterprises and public sector organisations, including emergency services. Security is paramount. We provide comprehensive documentation to prospective clients, including detail on our SLA and security processes and policies.

Access our security documentation (requires log in) >

Talk to a Keto Software compliance expert >

 

Certified secure

All network traffic is encrypted with TLS encryption and the information stored in the service is encrypted in REST. We will complete our Keto Software ISO 27001 certification audit during 2020.

Compliant local hosting

All our customers are hosted with segregated data services and we offer flexible compliant local hosting options. Most of our deployments are public cloud-based on the Google Cloud Platform, certified to ISO 27001, ISO 27017, ISO 27018 and SOC 1/2/3. We also have some e.g. Azure-based private cloud and some on-premise in the public sector.

In the UK, we have Cyber Essentials Plus certification and you can find Keto Software on the Crown Commercial Service list for government digital service providers.

More information in our doc lib

Get in touch to access our comprehensive security document library covering e.g.

  • Personal data and GDPR compliance
  • Audit rights
  • Support process
  • Service quality and usability
  • Business Continuity and Disaster Recovery
  • Personnel and software development security
  • Vulnerability and Penetration Testing

 

Read next


BACK TO TOP