Checkr uses the most advanced technology to deliver and protect sensitive information.
Your data is transferred with high-grade TLS and multi-layered encryption at rest with AES-256. Encryption keys are stored separately from the data, and it’s all hosted in our off-site, secure cloud infrastructure.
Data center security
Our server hosting locations are physically secured, staffed all day, every day by trained security guards who have undergone a thorough auditing process.
All applicant sensitive information is encrypted using AES-256 algorithm.
Advanced DDoS Mitigation
Our infrastructure provides multiple layers of DDoS protection. Additionally, we use Cloudflare, a security service that provides additional protection and is used by companies such as NASDAQ, MIT, and CISCO.
Every day our in-house security team reviews every security aspect of Checkr.
Third Party Testing
Our site and API undergoes independent, ongoing penetration testing, security scans, threat detection and greybox assessment by Matasano/NCC Group.
Real-time Audit Log
We keep a real-time audit log of all data access and changes made by administrators, customers, employees and our automated system.
Data Sources Monitoring
We provide clients with a live feed of Checkr data sources and services availability.
High Availability Infrastructure
Our system spans numerous physical locations, with N+1 or greater redundancy to establish resilience for all components.
We store backups in multiple secure locations and update them throughout the day, every day.
Near Perfect Uptime
Our technology ensures high availability of your information–99.99% uptime–while keeping security in mind.