Skip to content
Robust security

Securely connecting people and media

Your peace of mind is our priority. That's why we've crafted iconik as a robustly secure bridge to your media in the cloud. We dedicate ourselves to relentlessly protecting your data. Every iconik feature is built on a foundation of robust security and scalability, and we constantly test and prove the viability of our security measures. 

With iconik, you can share your content with confidence.

Encryption
All data in iconik is encrypted in transit using TLS 1.2+ and at rest using AES-256 encryption.
Secure Protocols
Iconik forces the use of HTTPS, HTTP2, or WSS and only uses TLS or QUIC, ensuring content is managed securely.
GDPR Compliant
Iconik complies with the latest General Data Protection Regulations to give you control over your personal information.
Secure Hybrid Cloud Storage
We designed the iconik Storage Gateway to be firewalled so no incoming connection can be established with on-premise storage.
Intrusion Detection
Machine Intelligence proactively supports monitoring and response to intrusion attempts.
Secure Access
Production environments are internally restricted to a handful of engineers and separate from testing and other environments.
Logging
We log all API calls and operations in iconik so they can be audited in a secure logging environment.
Password Hashing
All passwords in iconik are hashed and salted, making them nearly impossible to decode.
Regular Backups
Regular backups and penetration testing are core to our standard operation policy.
FREE RESOURCE

How to secure the media supply chain with iconik

State-of-the-art security

We built iconik's security framework to shield against unauthorized access, which has been verified by leading cyber security specialists. Our system's defenses are continually tested and battle-tested using rigorous standards such as NIST SP800-115, PTES, OWASP, and Offensive Security to ensure robust protection.
iconik-security-1

Dedicated to security at every stage

Design
We review all product design to ensure it complies with security requirements.
Development
Security tools run automatically to detect vulnerabilities in new code.
Deployment
We test all products extensively in the testing deployment phases.


Network security bolstered by global leaders

Iconik operates its network on Amazon AWS and Google Cloud, global cloud leaders who provide leading-edge security. This provides Iconik with Denial-of-Service protection and best-in-class operational and physical security.

We operate according to Google Cloud's Best Practices, which include Identity and access management, multifactor authentication, Automated Security Scanning, Application Firewalls and Intrusion Detection, and Denial-of-Service Attack Mitigation.

Easily manage asset visibility

With iconik's metadata management, you can control the visibility of information down to a per-user basis, ensuring people see only what's relevant or necessary and keeping sensitive data restricted.

Secure content with detailed roles and access rights

Iconik is designed for precise control over who sees and interacts with your media. With detailed rights management, you can specify access for individuals or groups, tailoring their capabilities from viewing to commenting, downloading, and sharing. This granular approach ensures that media is accessible to the right people while safeguarding against unauthorized access or actions.

  • Give or revoke access rights to a single user or a group of users.
  • Restrict or permit downloads and comments.
  • Edit or revoke access rights for iconik share links
iconik-security-2

Inform with warning labels or block access

Before your media is edited or shared, iconik's warning labels ensure users are aware of important information. You can create custom warnings for usage restrictions, rights expirations, or critical details.

For ultimate control, you can easily block the downloading or sharing of assets, giving you peace of mind that your content remains secure and used appropriately.

iconik-security-3

Dive into our security documentation

Want to take a closer look at our security processes? You’ll find a lot more information about iconik’s security via the link below.