Skip to main content

Data security with Heka

Heka uses a multi-layered security model and security-by-design principles.

Heka uses a multi-layered security model and security-by-design principles. At the hardware level, our platforms are hosted on certified IT infrastructures that are regularly audited. At the software level, the code of each project is executed in isolated containers and the project data is stored in a dedicated database.