Skip to main content

Security

Enkom takes security seriously. Our products are built with zero trust, post-quantum encryption, and identity-based access control.

Reporting vulnerabilities

If you believe you've found a security vulnerability, please report it to us responsibly. We appreciate the security community's help in keeping our users safe.

Email: [email protected]

We aim to acknowledge reports promptly and will keep you updated on our assessment and any remediation.

Disclosure policy

We follow coordinated disclosure. We ask that you give us reasonable time to address issues before public disclosure. We will credit researchers who report valid issues (unless they prefer to remain anonymous).