Book a demo

Security & Reliability

Protect operational data across every step of the workflow

Juakali is built to support secure, structured, and auditable operations for microfinance institutions. From field data capture to approvals and integrations, we apply practical safeguards to protect customer and operational data.

Built on secure cloud infrastructure

Juakali runs on Google Cloud Platform, with application workloads deployed in isolated environments designed for reliability, controlled access, and operational resilience. The platform supports field and back-office workflows with structured deployment processes and clear separation between production and non-production environments.

Google Cloud Platform hosting • Separate production and non-production environments • Secure application deployment workflows • Scalable application architecture • Controlled infrastructure access

Protect data in transit and at rest

Juakali applies standard security controls to protect data as it moves through the platform and while it is stored.

In transit

All traffic between user devices and the platform is protected over HTTPS/TLS. Authentication and session handling follow standard secure application practices.

At rest

Stored data is protected at rest within the platform infrastructure using managed security controls and restricted access practices.

Digitise Documents Icon

Reporting

. At the end of the pilot, we provide a detailed Pilot Assessment Report that includes impact analysis, key numbers, and challenges.

Access Control

Control who can access what

Access to Juakali is managed through role-based permissions and internal access controls. The goal is simple: users should only have access to the data and actions required for their role.

Role-based access control • Least-privilege access principles • Restricted administrative access • Internal approval for sensitive access • Auditability of important actions

Customer Data Isolation

Keep customer data separated

Juakali is designed so that each customer organization's data remains separated from other organizations using the platform. This helps maintain confidentiality and supports controlled access across customers and teams.

Data separation • Separate database schemas • Multi-tenant architecture

Backups, Monitoring, and Recovery

Monitor systems and prepare for recovery

Access to Juakali is managed through role-based permissions and internal access controls. The goal is simple: users should only have access to the data and actions required for their role.

Role-based access control • Least-privilege access principles • Restricted administrative access • Internal approval for sensitive access • Auditability of important actions

Availability and Continuity

Support continuity for day-to-day operations

Juakali is used for operational workflows that teams depend on every day. The platform is therefore managed with a focus on stability, recoverability, and practical continuity for field and back-office teams.

Scalable application services • Redundant managed infrastructure • Recovery procedures • Ongoing performance monitoring

Report a security concern

If you believe you have identified a potential security issue, contact us and we will review it promptly through our internal process.

Contact