Security you can audit.
We love when your IT team asks questions. Here are the most common answers.
Two-factor authentication
Authenticator-app based. No SMS. Optionally enforced org-wide.
Audit log
Every mutation on candidate, application, offer is logged with timestamp + actor. Export on request.
Encryption
TLS 1.3 in transit. Encryption at rest on DB and backup volumes. Short-lived JWT.
Backups
Daily DB snapshotting. Point-in-time restore for any day in the last 30.
Hosted in Germany
No third-country transfer. DPA on request. No US-cloud dependency for candidate data.
Responsible disclosure
Report security issues to security@KI BMS. We respond within 24h and publish patches transparently.