This page provides information on the latest security measures taken by Yoom.
You can view the most up-to-date security checklists at the links below.
https://docs.google.com/spreadsheets/d/1OXmPF_95MT6y73ysuDhPdYqRoEk2_UTqvShNiUEYBeE/edit?gid=2139818785#gid=2139818785
At Yoom, your data is encrypted within the database. Additionally, highly sensitive information—such as access tokens for integrated apps—is encrypted at the application level.
All communication with Yoom is encrypted via SSL/TLS, preventing data tampering, spoofing, and leakage of communication content by malicious third parties.
To safeguard against unauthorized access to Yoom’s servers, we have implemented DDoS protection, a WAF (Web Application Firewall), intrusion detection, and firewalls, enabling us to defend against illegitimate access and detect suspicious activities.
Yoom offers robust security-enhancing features, such as “IP Restrictions,” “Two-Factor Authentication,” “Single Sign-On (SSO),” and “SAML Authentication.”
Yoom has formulated a Security Policy, which is publicly available. In accordance with this policy, we have built an organizational structure, various regulations, and operational manuals. We also focus on establishing frameworks and guidelines for responding to information leaks.
We take security measures in our office environment as well. Access to our office is strictly controlled, and confidential documents are disposed of through a paper dissolution box. These measures help maintain a highly secure office environment.