We were included  in Forbes list of “100 Startups to watch in Colombia in 2025”
Find our technical documentation: docs.gatekeeperx.com
Arrow
Arrow
We were included  in Forbes list of “100 Startups to watch in Colombia in 2025”
Find our technical documentation: docs.gatekeeperx.com
Arrow
Arrow
security

Your trust is our technical priority.

At GatekeeperX, security is not an afterthought. We design our services with security and data protection at their core, fully convinced and committed that this is the right path to preserve and strengthen long-term trust and relationships with our clients and partners.

Our Status

A compliance approach based on continuous automation, external validation, and transparency, ensuring adherence to the most demanding security and regulatory frameworks.

We implement a compliance automation platform (Vanta) to manage, monitor, and collect security evidence 24/7. This approach ensures:

Continuous Monitoring: Real-time oversight of controls, minimizing the risk of non-compliance before audits.
Broad and Integrated Coverage: Covers cloud infrastructure, applications, Identity and Access Management (IAM), workstation security, and key internal processes.
Audit Efficiency: Automation significantly reduces preparation time and resource allocation.

Our Compliance Progress and Roadmap

Security Pillars at GatekeeperX

Data Protection

For encryption at rest, we use strong encryption algorithms such as AES-256, and for communications security, TLS 1.2 or higher. Our architecture is designed to ensure that each customer’s data remains secure and logically isolated.

Infrastructure Security

We operate on leading cloud providers with redundant availability zones. We implement a resilient and redundant architecture that eliminates single points of failure, along with advanced monitoring and anomaly detection capabilities, intrusion prevention mechanisms, and a secure development lifecycle with proactive security measures.

Ethical and Secure Artificial Intelligence

We are early adopters of AI management standards to ensure that our models are transparent, explainable, and secure against adversarial machine learning attacks.

Organizational Security

For encryption at rest, we use strWe strictly apply the principle of least privilege. Our culture prioritizes Security and Privacy by Design and a Zero Trust approach.ong encryption algorithms such as AES-256, and for communications security, TLS 1.2 or higher. Our architecture is designed to ensure that each customer’s data remains secure and logically isolated.

Information and Transparency

We are aligning our processes with the world’s most demanding regulations and local privacy laws, ensuring that:

We do not sell your data to third parties. Read our Personal data processing policy
We implement strict data retention and deletion policies in accordance with local legislation.
Coming Soon (Sept. 2026): A self-service portal for ARCO rights requests.
Our commitment to transparency can be verified through our Trust Portal
You can view our service status on our Status Page:
Stay up to date with new releases, updates, and features on our Release Notes page: gatekeeperx.com/press-release

Do you need to review our reports?

If you are a current customer or are undergoing an evaluation process (Due Diligence or RFP), you may request (subject to NDA) our SOC 2 Type I report or our SOC 2 Type II Bridge Letter.