Security is Our Core and Commitment.

Our mission is to empower people to tell their stories with media by using iconik as a safe haven in the cloud.

Each part of iconik was designed with scalability and security in mind. Iconik is devoted to constantly testing and proving that our security measures will protect your data in the cloud.

Security Features


All data in iconik is encrypted both in transit using TLS 1.2+ and at rest using AES-256 encryption.

Secure Protocols

Iconik forces usage of HTTPS, HTTP2 or WSS, and only uses TLS or QUIC.

GDPR Compliant

Iconik complies with the latest General Data Protection Regulation (GDPR) to give you control over your personal information.

Secure Hybrid Cloud Storage

The iconik Storage Gateway is designed to be firewalled so that no incoming connection can be established with on-premise storage.

Intrusion Detection

Machine Intelligence proactively supports monitoring and responding to intrusion attempts.

Secure Access

Production environments are internally restricted to a handful of engineers and separated from testing and other environments.


Iconik logs all API calls and operations in iconik to be audited in a secure logging environment.

Password Hashing

All passwords in iconik are hashed and salted, making them nearly impossible to decode.

Regular Backups

Regular backups and penetration testing are an important part of our standard operation policy.

State-of-the-art Security

We designed iconik’s system to protect against unauthorized access with the help of multiple external cyber security experts who have tested iconik’s systems. These external experts used methodologies and standards like NIST SP800-115, PTES, OWASP and Offensive Security to evaluate iconik’s system security and to help ensure its effectiveness.


All product design is reviewed to ensure it complies with security requirements.


Security tools run automatically to detect vulnerabilities for new code.


We test all products extensively in the testing deployment phases.

Network Security

Iconik operates its network on Amazon AWS and Google Cloud, global cloud leaders who provide leading edge security. This provides iconik with Denial of Service Protection, and best in class operational and physical security.

We use Google Clouds Best Practices which include; Identity & access management, Multifactor authentication, Automated Security Scanning, Application Firewalls and Intrusion Detection, and Denial of Service Attack Mitigation.

Decide What Data to Show

By using iconik’s metadata management, you can limit which information is shown to each user. With this, you can show users information that’s relevant to them or restrict access to sensitive information.

Metadata Fields
Metadata Fields
Metadata Fields

Secure Content with
Detailed Roles & Access Rights

The right people should be able to find and use the media they need, and some others shouldn’t see it all.

Every part of iconik is rights managed with granular control over user and group access and what they are allowed to do with the media they access.

Give or revoke access rights to a single user or a group of users.
Restrict or permit downloads and comments.
Edit or revoke access rights for iconik share links

Safeguard Sensitive Content

Is there important information users should know before editing or sharing using your media? Iconik warning labels can be used to let them know. You can create warnings around usage restrictions, rights expirations, or anything else.

When you want to be absolutely sure that content cannot be shared or downloaded, you can rest easy by blocking those actions from happening.

Block assets from being downloaded or shared
Use Asset Warning Labels

This Cloud is Iron-clad

Iconik was built for the cloud, but there’s nothing fluffy about our security features that keep your media safe. Your media is your story, and iconik will protect it.

Read Our Security Documentation

Want to dive deeper? You’ll find a lot more information about iconik’s security here.
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More info on our cookie usage.