Data protection
Komo uses encryption in transit, managed cloud infrastructure, least-privilege access controls and environment separation to protect customer data. Production access is limited to authorized personnel who need it to operate and support the service.
Account security
We support secure authentication, role-based workspace permissions and integration authorization flows. Customers are responsible for maintaining strong passwords, managing teammate access and disconnecting integrations that are no longer needed.
Infrastructure monitoring
We monitor application health, security events and platform availability so we can respond quickly to incidents. Backups and operational procedures are designed to support service continuity.
Vendors and integrations
Komo works with trusted vendors for hosting, payments, analytics, support and AI features. We review vendors based on the data they process and the safeguards they provide.
Responsible disclosure
If you believe you found a vulnerability, please email security@komo.app with enough detail for us to reproduce and validate the issue. Please do not access, modify or delete data that does not belong to you.
Compliance requests
For security questionnaires, vendor reviews or enterprise compliance requests, contact security@komo.app.