This Cloud is Iron-clad

Iconik was built for the cloud, but there’s nothing fluffy about our security features that keep your media safe. Your media is your story, and iconik will protect it.

Security is Our Core and Commitment.

Our mission is to empower people to tell their stories with media by using iconik as a safe haven in the cloud.

Each part of iconik was designed with scalability and security in mind. Iconik is devoted to constantly testing and proving that our security measures will protect your data in the cloud.

Security Features


All data in iconik is encrypted both in transit using TLS 1.2+ and at rest using AES-256 encryption.

Secure Protocols

Iconik forces usage of HTTPS, HTTP2 or WSS, and only uses TLS or QUIC.

GDPR Compliant

Iconik complies with the latest General Data Protection Regulation (GDPR).

Secure Hybrid Cloud Storage

The iconik Storage Gateway can be firewalled so that no incoming connection can be established with on-premise storage.

Intrusion Detection

Machine Intelligence proactively supports monitoring and responding to intrusion attempts.

Secure Access

Production environments are internally restricted to a handful of engineers and separated from testing and other environments.


Iconik logs all API calls and operations in iconik to be audited in a secure logging environment.

Password Hashing

All passwords in iconik are hashed and salted, making them nearly impossible to decode.

Regular Backups

Regular backups and penetration testing are an important part of our standard operation policy.

Proven State-of-the-art Security

You can breathe easy knowing that unauthorized people cannot penetrate iconik’s system. Multiple external cyber security experts have tested iconik and ruled that our security is state-of-the-art and effective.

These external auditors with certifications in CISSP, OSCP, CEH, PCIP, ISO, CISA, CISM, used methodologies and standards like NIST SP800-115, PTES, OWASP and Offensive Security to evaluate and confirm iconik’s security.

Security at every stage


All product design is reviewed to ensure it complies with security requirements.


Security tools run automatically to detect vulnerabilities for new code.


We test all products extensively in the testing deployment phases.


Network Security

Iconik operates it's network on Amazon AWS and Google Cloud, global cloud leaders who provide leading edge security. This provides iconik with Denial of Service Protection, and best in class operational and physical security.

We use Google Clouds Best Practices which include; Identity & access management, Multifactor authentication, Automated Security Scanning, Application Firewalls and Intrusion Detection, and Denial of Service Attack Mitigation.

Metadata views

Decide What Data to Show

By using iconik’s metadata management, the information around your content will always be helpful—never harmful. You can build custom metadata views to only present relevant data for each user.


Secure Content with
Detailed Roles & Access Rights

The right people should be able to find and use the media they need, and some others shouldn’t see it all.

Every part of iconik is rights managed with granular control over user and group access and what they are allowed to do with the media they access.

Give or revoke access rights to a single user or a group of users.
Restrict or permit downloads and comments.
Edit or revoke rights for iconik shares.

Safeguard Sensitive Content

Is there important information users should know before editing or sharing using your media? Iconik warning labels can be used to let them know. You can create warnings around usage restrictions, rights expirations, or anything else.

When you want to be absolutely sure that content cannot be shared or downloaded, you can rest easy by blocking those actions from happening.

Block assets from being downloaded or shared
Use Asset Warning Labels
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More info on our cookie usage.