Back to Home

Security

Techknowledgey Pte Ltd • Last updated: April 8, 2026

1. Security Program

Techknowledgey Pte Ltd maintains a risk-based security program designed to protect confidentiality, integrity, and availability of data in our Services.

2. Key Controls

  • Encryption in transit using modern TLS.
  • Encryption at rest where supported by infrastructure.
  • Access controls based on least privilege and need-to-know.
  • Authentication safeguards and credential protection.
  • Centralized logging, monitoring, and alerting.
  • Network and application hardening controls.
  • Secure development and code review practices.
  • Vulnerability management and patching workflows.
  • Backup and recovery procedures.

3. Incident Response

We maintain incident response procedures for detection, containment, investigation, remediation, and post-incident review. Where legally required, we provide breach notifications.

4. Shared Responsibility

You are responsible for configuring account settings, managing user access, securing endpoints, and protecting credentials. You should promptly remove unused accounts and apply your own internal controls.

5. Vulnerability Reporting

To report a suspected vulnerability, contact security@techknowledgey.com. Include reproduction steps and impact details. Do not exploit vulnerabilities or access data you are not authorized to access.

6. Important Limitation

No system is completely secure. We do not guarantee that Services will be free from all vulnerabilities, interruptions, or unauthorized access attempts.

7. Contact

Techknowledgey Pte Ltd
Security contact: support@getscout.ai