Security Measures & Certifications

        SOC-white background

        Our Commitment to Your Security is Paramount!

        Tookitaki recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.

        As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Tookitaki so that our customers can feel confident in choosing us as a trusted provider.

        This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.

         

        Learn more about our security policies. 

        1
        Data security
        • Inventory of Infrastructure Assets
        • Testing for Reliability and Integrity
        2
        Network security
        • External System Connections
        • Transmission Confidentiality

        • Anomalous Behavior

        • Data used in Testing

        • Centralized Collection of Security Event Logs

        3
        App security
        • Conspicuous Link To Privacy Notice
        4
        Endpoint security
        • Malicious Code Protection (Anti-Malware)
        • Endpoint Security Validation
        5
        Corporate security
        • Code of Business Conduct
        • Organizational Structure
        • Roles & Responsibilities
        • New Hire Policy Acknowledgement
        • Security & Privacy Awareness
        • Periodic Policy Acknowledgement
        • Automated Reporting
        • Incident Reporting Assistance
        • Risk Framing
        • Risk Assessment
        • Fraud
        • Third-Party Criticality Assessments
        • Assigned Cybersecurity & Privacy Responsibilities
        6
        Corporate security
        • Internal Audit using Sprinto
        • Periodic Review & Update of Cybersecurity & Privacy Program
        • Management Review of Org Chart
        • Management Review of Risks
        • Management Review of Third-Party Risks
        • Subservice organization evaluation
        • Segregates Roles and Responsibilities
        • Testing
        • PCI DSS Requirements
        • Asset Ownership Assignment
        • New Hire Security & Privacy Training Records
        • Updates During Installations / Removals
        • Inventory of Endpoint Assets

        Our Commitment to Security

        Certification-2

        Ensuring Security with Certification

        • Trust our SOC 2 certifications, which reaffirm our commitment to maintaining the highest security levels, offering you assurance about the safety of your sensitive data.
        • We manage customer data in a strictly controlled and regularly audited environment, proving our dedication to security.

        Robust Security Protocols

        • Robust measures such as data encryption, multi-factor authentication, regular security audits, and strict access controls.
        • Continuous monitoring and proactive threat detection systems to respond to any potential security issues swiftly and effectively.
        Security
        Transparency

        Trust and Transparency

        • Trust is at the core of our relationship with clients; we aim to earn and maintain it by prioritizing your security and confidentiality and exceeding industry standards.
        • We transparently communicate our security practices and certifications, allowing you to focus on leveraging our anti-financial crime platform in the knowledge that your data is safe.

        Partners Who Trust Us

        • UOB

           

        • |
        • Paymongo

           

        • |
        • Mayabank

           

        • |
        • Tencent

           

        • |
        • Hakrinbank

           

        • |
        • Fubon

           

        • |
        • Customer Logos (1)

           

        • |
        • Hibank

           

        • |