Security is of uppermost priority at Flike
Security & Compliance
Links
1. Data protection
All datastores with customer data, in addition to Google Cloud storage, are encrypted at rest. Sensitive collections and tables also use row-level encryption.This means the data is encrypted even before it hits the database so that neither physical access, nor logical access to the database, is enough to read the most sensitive information.
Flike uses TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We also use features such as HSTS (HTTP Strict Transport Security) to maximize the security of our data in transit. Server TLS keys and certificates are managed by GCP and deployed via Application Load Balancers.
2. Penetration Testing
Flike engages with one of the best penetration testing consulting firms in the industry at least annually. All areas of the Flike product and cloud infrastructure are in-scope for these assessments, and source code is fully available to the testers in order to maximize the effectiveness and coverage.
3. Enterprise Security
All corporate devices are centrally managed and are equipped with mobile device management software and anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.
4. Bug Bounty Program
Email: support@flike.app
5. Bug Bounty Program
At Flike, data privacy is a first-class priority—we strive to be trustworthy stewards of all sensitive data.