The security and privacy of your data are of utmost importance to us. We are continuously identifying and implementing state-of-the-art security practices for our online whiteboard platform.Try Jeda AI Now
Qualys' SSL Labs rated Jeda AI's SSL implementation an "A" on their SSL Server test.
We are using AWS Cognito with SRP authentication, key-exchange protocol, and SHA hash functions.
Users are required to validate their accounts via a confirmation code provided in an automated e-mail.
Our cloud provider is Amazon AWS. We utilize a 100% serverless architecture, overlaying, and augmenting AWS compliance and security programs. We designed our architecture to follow international security standards and regulations while protecting confidentiality, data sovereignty, and data privacy regulations. We leverage AWS tools to set up firewall rules, intrusion, and DMZ policies.
We employ AWS CloudWatch for Application and Infrastructure monitoring.
We use several AWS services for logging, including:
We work with the following companies and tool systems to store, analyze, and transmit data for our users. They've been carefully vetted for best-in-class privacy, security practices, and compliance practices.
If you have any questions about our security practices, please contact.