Security &
Compliance
Built for the most security-conscious organizations. KyberAccess meets the strictest compliance requirements so you can focus on what matters.
Data Security
Your Data, Fully Protected
Multiple layers of security protect your visitor data at every stage.
AES-256 Encryption
All data encrypted at rest using AES-256 encryption, the same standard used by financial institutions and governments.
TLS 1.3 In Transit
Every connection to KyberAccess is encrypted with TLS 1.3, ensuring data cannot be intercepted during transmission.
Google Cloud (Firebase)
Data hosted on Google Cloud infrastructure with SOC 2 Type II, ISO 27001, and FedRAMP certifications.
Automatic Backups
Continuous backups with point-in-time recovery. Your data is protected against accidental deletion or corruption.
Data Residency (Enterprise)
Choose where your data is stored to comply with regional data sovereignty laws and organizational policies.
Access Control
Control Who Has Access
Fine-grained controls ensure the right people have the right access.
Role-Based Access
Four distinct roles — Admin, Guard, Host, and Viewer — with granular permissions for every feature.
Two-Factor Authentication
Protect admin accounts with 2FA using authenticator apps or SMS verification codes.
SSO / SAML (Enterprise)
Enterprise single sign-on with Okta, Azure AD, Google Workspace, OneLogin, and custom SAML providers.
Session Timeout Controls
Configure automatic session timeouts to prevent unauthorized access from unattended devices.
IP Allowlisting
Restrict admin dashboard access to approved IP addresses and network ranges.
Compliance
Built for Regulatory Compliance
KyberAccess is designed to help your organization meet industry-specific regulatory requirements.
FERPA
KyberAccess helps educational institutions comply with FERPA by protecting student and family information. Our visitor logs, access controls, and data retention policies are designed with FERPA requirements in mind.
GDPR
For organizations operating in the EU, KyberAccess provides data subject access requests, right to erasure, configurable data retention, and consent management.
HIPAA
Healthcare facilities can leverage KyberAccess with BAA support, encrypted visitor records, and audit trails that meet HIPAA requirements.
SOC 2
Our infrastructure is built on SOC 2 Type II compliant cloud services with continuous monitoring and annual audits.
CCPA
California businesses benefit from our CCPA-ready data handling, including disclosure controls and opt-out mechanisms.
Audit Trail
Every Action Is Logged
KyberAccess maintains a complete, tamper-proof audit trail of every action taken in the system. From visitor check-ins to admin configuration changes, nothing goes unrecorded.
Sarah Chen — Badge #V-2847 printed
System — Email sent to john@company.com
System — Driver's license scanned & validated
Sarah Chen — Document stored in Google Drive
admin@company.com — 2FA verified, IP: 192.168.1.100
admin@company.com — Data retention set to 90 days
Data Retention
You control how long data is stored. Configure automatic purging of visitor records to comply with your organization's data retention policies.
Penetration Testing
Regular third-party security assessments ensure our platform stays ahead of emerging threats and vulnerabilities.
Questions About Security?
Our security team is ready to answer your questions and provide detailed documentation for your compliance review.