Welcome to the Kyla Security Portal! This portal provides an overview of our commitment to security and compliance. You can find our certifications, security practices, and explore details on our controls.

security@kyla.com
Privacy Policy
Data Security Controls >
  • Data retention procedures established
  • Customer data deleted upon deactivation
  • Data classification policy established
  • see more..
Infrastructure Security >
  • Unique production database authentication enforced
  • Encryption key access restricted
  • Unique account authentication enforced
  • see more..
Internal Security Controls >
  • Continuity and Disaster Recovery plans established
  • Continuity and disaster recovery plans tested
  • Cybersecurity insurance maintained
  • see more..
Organizational Security Controls >
  • Asset disposal procedures utilized
  • Production inventory maintained
  • Portable media encrypted
  • see more..
Product Security Controls >
  • Data encryption utilized
  • Control self-assessments conducted
  • Penetration testing performed
  • see more..