Khoros Trust Center

We take our commitment to protect your company, employees, and customers seriously. Learn why the world’s most trusted brands, and highly-regulated industries, trust Khoros with their data.

How we protect our customers

Khoros uses enterprise-class security features and comprehensive audits of our solutions, systems, and networks to protect your data. With major enterprise customers around the globe, we built our security controls to meet or exceed the highest of industry standards.

We protect sensitive customer information by implementing operational policies and procedures for proactive monitoring, data encryption at rest and in transit, vulnerability management, intrusion detection and prevention, and data retention and destruction.

Khoros has robust processes in place to assure that security is tightly integrated within our products.

Khoros hosts it’s products on Amazon Web Services (AWS) in the United States, Ireland* and Australia*. The AWS Security Whitepaper outlines the physical and environmental controls. AWS also supports ISO 27001, SOC2 Type II, FedRAMP and FISMA certification.

With a dedicated Security Incident Response team, and well-established policies and procedures (known as runbooks), Khoros manages and acts on all potential security incidents quickly.

Khoros utilizes AWS as its strategic hosting provider, which spans multiple geographic locations, each leveraging more than one availability zone. This ensures our software can be delivered regionally and remains resilient.

Khoros maintains a well-established risk management program and a dedicated owner responsible for document maintenance and an annual security risk review. For the review, we perform in-depth risk analyses for all critical systems, document results in a central tracking system, and remediate based on findings. Assessments are conducted annually at a minimum.

Khoros engages third party vendors to provide services most effectively to our customers. To protect your data and maintain the Khoros security posture, we establish contractual agreements that require these vendors to adhere to requirements laid out by Khoros. Review the list of Khoros sub-services organizations here.

DOCUMENTS, POLICIES, AND PRACTICES

Resource centers

Access all the latest information on how we safeguard business integrity, mitigate risks, and foster a secure and transparent business environment for our customers.

Security

Data privacy & protection

Compliance

Customer agreements

Website visitors

CONTACT US

Additional questions?
We have answers.

Legal

For general legal questions and notices, please email legal@khoros.com.

Privacy and subject access request

If you have a subject access request, please fill out the form here.

Compliance

For general compliance questions, please email compliance@khoros.com.


To report an ethics or compliance violation, please visit our Ethics and Compliance Hotline here.

Security

For customer questions about Khoros’s information security and data protection, or to request a copy of our compliance documentation, reach out to your CSM or account team. For all other inquiries, you can contact us here.

Khoros suppliers

If you are a Khoros supplier and need to contact us, please email Procurement at procurement@khoros.com or Accounts Payable at ap@khoros.com.

TRUSTED BRANDS TRUST KHOROS

  • Target logo
  • Slack logo
  • Virgin logo
  • T mobile logo
  • Google logo
  • Zoom logo