{"id":22522,"date":"2019-03-20T09:14:44","date_gmt":"2019-03-20T08:14:44","guid":{"rendered":"https:\/\/zenkit.com\/?page_id=22522"},"modified":"2025-11-04T06:53:10","modified_gmt":"2025-11-04T05:53:10","slug":"security-practices","status":"publish","type":"page","link":"https:\/\/zenkit.com\/en\/security-practices\/","title":{"rendered":"Security Practices"},"content":{"rendered":"\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group width--950 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:45px;--tablet-height:45px;--mobile-height:16px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h1 class=\"wp-block-heading has-text-align-center\" style=\"margin-bottom:8px\">Zenkit Security<\/h1>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center subheading\">We use Zenkit every day<\/p>\n<\/div>\n\n\n\n<div style=\"height:48px;--tablet-height:36px;--mobile-height:24px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-9235c805 wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center\">We use Zenkit every day to interact with you, our customer, and to continue to develop Zenkit itself. We take the utmost care to protect the data entrusted to Zenkit, because if your data is at risk, so is ours. Protecting your data and ours is therefore our highest priority.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:48px;--tablet-height:36px;--mobile-height:24px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group affiliate__grid has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group affiliate__box has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-radius:20px\">\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/Zenkit-Web-App.svg\" alt=\"\" class=\"wp-image-110270\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-bottom:4px\">\n<h3 class=\"wp-block-heading has-text-align-center card__title\">Zenkit Web App Security<\/h3>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-da-grey-1-color has-text-color has-link-color wp-elements-eb609f0de28b7f0195db564a75bd9dc9\">We have automatic backups of all Zenkit data completed on a daily basis. Zenkit uses Amazon Web Services which are based in Frankfurt, Germany. In the interests of complying with the <a href=\"https:\/\/en.wikipedia.org\/wiki\/General_Data_Protection_Regulation\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a> and the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Federal_Commissioner_for_Data_Protection_and_Freedom_of_Information\" target=\"_blank\" rel=\"noreferrer noopener\">BDSG<\/a>, we have signed a Data Processing Agreement (DPA) with our third party data processors. We are fully compliant with these regulations, and you can learn more about our practices at <a href=\"https:\/\/zenkit.com\/en\/gdpr\/\">https:\/\/zenkit.com\/gdpr.<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group affiliate__box has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-radius:20px\">\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/Sicherheit-in-Zenkits-Datenzentren.svg\" alt=\"\" class=\"wp-image-110280\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-bottom:4px\">\n<h3 class=\"wp-block-heading has-text-align-center card__title\">Data Center Security<\/h3>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-da-grey-1-color has-text-color has-link-color wp-elements-93720bf1b784cc51d7373e28cf7e86dd\">Amazon Web Services (RDS &amp; S3, contractual partner AWS Luxembourg) employs a robust physical security program with multiple certifications, including an SSAE 16 and ISO27001 certification. Amazon has built in redundancies and continually monitored servers. For more information on Amazon\u2019s physical security processes, please visit <a href=\"https:\/\/aws.amazon.com\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">aws.amazon.com\/security<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:88px;--tablet-height:72px;--mobile-height:40px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2eb748b2 wp-block-columns-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Encryption<\/h2>\n\n\n\n<ul class=\"wp-block-list is-style-da-left-indent\">\n<li>Web connections to Zenkit are secured via TLS 1.2<\/li>\n\n\n\n<li>Insecure connections are not allowed using TLS 1.0 or below, as well as RC4<\/li>\n\n\n\n<li>Data is encrypted at rest<\/li>\n\n\n\n<li>All passwords are encrypted using the strongest encryption algorithm available<\/li>\n\n\n\n<li>No leaked passwords can be used<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Security Features<\/h2>\n\n\n\n<ul class=\"wp-block-list is-style-da-left-indent\">\n<li>No guest access allowed: This means that each user needs an account for access<\/li>\n\n\n\n<li>No external file sharing allowed: Generated links to files aren\u2019t shareable<\/li>\n\n\n\n<li>Google and native authorization supported<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:88px;--tablet-height:72px;--mobile-height:40px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-da-blue-color-new has-text-color has-link-color wp-elements-fd957911838b18bbaa3b01746314f3cc\">Your Data Is Yours<\/h2>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-64ec6e8c wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center has-da-grey-2-color has-text-color has-link-color wp-elements-5aaec46eeb75230c90c54e6a4af69ae4\">We know there are a lot of companies that collect data to make money. That\u2019s not us. We want you to be productive. If that is with us, great! If you want to take your data with you to another service, we\u2019ll be sad, but you can export it all and take it with you. You can also completely remove all of your data from our servers in compliance with <a href=\"https:\/\/zenkit.com\/en\/gdpr\/\">GDPR<\/a>.<\/p>\n<\/div>\n\n\n\n<div style=\"height:88px;--tablet-height:72px;--mobile-height:40px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-table aligncenter table__data-security is-style-regular\"><table class=\"has-fixed-layout\"><tbody><tr><td>Servers located in Germany<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Backup servers in Germany<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>European contracting partner for data hosting<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>SSL via HTTPS<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Encrypted Passwords<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Encryption at rest<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Native 2 Factor Authentication<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Google 2FA Supported<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>File Access Management<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Regular backups on a separate server<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Single Sign On<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Identity and Access Management<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Password validation intervals<\/td><td><img decoding=\"async\" class=\"wp-image-110297\" style=\"width: NaNpx;\" src=\"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/check.svg\" alt=\"\"><\/td><\/tr><tr><td>Intrusion Detection System<\/td><td>Planned<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n\n\n\n<div style=\"height:88px;--tablet-height:72px;--mobile-height:40px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-da-blue-light-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:80px;--tablet-height:36px;--mobile-height:26px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Contact Us<\/h2>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-2687bd63 wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center has-da-grey-1-color has-text-color has-link-color wp-elements-2db342c3f723c78820878aa45ba0e45a\">If you have a security concern, please contact us at: <a href=\"mailto:security@zenkit.com\">security@zenkit.com<\/a><\/p>\n<\/div>\n\n\n\n<div style=\"height:80px;--tablet-height:36px;--mobile-height:26px\" class=\"wp-block-lookeen-blocks-responsive-spacer\"><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zenkit Security We use Zenkit every day We use Zenkit every day to interact with you, our customer, and to continue to develop Zenkit itself. We take the utmost care to protect the data entrusted to Zenkit, because if your data is at risk, so is ours. Protecting your data and ours is therefore our [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":21,"comment_status":"closed","ping_status":"closed","template":"","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"class_list":["post-22522","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Practices | Zenkit<\/title>\n<meta name=\"description\" content=\"Zenkit takes great care to secure your personal information and to comply with GDPR and other data privacy regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zenkit.com\/en\/security-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Practices | Zenkit\" \/>\n<meta property=\"og:description\" content=\"Zenkit takes great care to secure your personal information and to comply with GDPR and other data privacy regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zenkit.com\/en\/security-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Zenkit\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ZenkitHQ\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-04T05:53:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ZenkitHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"48 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/\",\"url\":\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/\",\"name\":\"Security Practices | Zenkit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zenkit.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Zenkit-Web-App.svg\",\"datePublished\":\"2019-03-20T08:14:44+00:00\",\"dateModified\":\"2025-11-04T05:53:10+00:00\",\"description\":\"Zenkit takes great care to secure your personal information and to comply with GDPR and other data privacy regulations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zenkit.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Zenkit-Web-App.svg\",\"contentUrl\":\"https:\\\/\\\/zenkit.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Zenkit-Web-App.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/security-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zenkit.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zenkit.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/zenkit.com\\\/en\\\/\",\"name\":\"Zenkit\",\"description\":\"Zenkit Tagline\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zenkit.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},false]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Practices | Zenkit","description":"Zenkit takes great care to secure your personal information and to comply with GDPR and other data privacy regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zenkit.com\/en\/security-practices\/","og_locale":"en_US","og_type":"article","og_title":"Security Practices | Zenkit","og_description":"Zenkit takes great care to secure your personal information and to comply with GDPR and other data privacy regulations.","og_url":"https:\/\/zenkit.com\/en\/security-practices\/","og_site_name":"Zenkit","article_publisher":"https:\/\/www.facebook.com\/ZenkitHQ","article_modified_time":"2025-11-04T05:53:10+00:00","twitter_card":"summary_large_image","twitter_site":"@ZenkitHQ","twitter_misc":{"Est. reading time":"48 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/zenkit.com\/en\/security-practices\/","url":"https:\/\/zenkit.com\/en\/security-practices\/","name":"Security Practices | Zenkit","isPartOf":{"@id":"https:\/\/zenkit.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zenkit.com\/en\/security-practices\/#primaryimage"},"image":{"@id":"https:\/\/zenkit.com\/en\/security-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/Zenkit-Web-App.svg","datePublished":"2019-03-20T08:14:44+00:00","dateModified":"2025-11-04T05:53:10+00:00","description":"Zenkit takes great care to secure your personal information and to comply with GDPR and other data privacy regulations.","breadcrumb":{"@id":"https:\/\/zenkit.com\/en\/security-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zenkit.com\/en\/security-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zenkit.com\/en\/security-practices\/#primaryimage","url":"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/Zenkit-Web-App.svg","contentUrl":"https:\/\/zenkit.com\/wp-content\/uploads\/2025\/01\/Zenkit-Web-App.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/zenkit.com\/en\/security-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zenkit.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security Practices"}]},{"@type":"WebSite","@id":"https:\/\/zenkit.com\/en\/#website","url":"https:\/\/zenkit.com\/en\/","name":"Zenkit","description":"Zenkit Tagline","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zenkit.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},false]}},"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/pages\/22522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/comments?post=22522"}],"version-history":[{"count":6,"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/pages\/22522\/revisions"}],"predecessor-version":[{"id":168322,"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/pages\/22522\/revisions\/168322"}],"wp:attachment":[{"href":"https:\/\/zenkit.com\/en\/wp-json\/wp\/v2\/media?parent=22522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}