Juakali is built to support secure, structured, and auditable operations for microfinance institutions. From field data capture to approvals and integrations, we apply practical safeguards to protect customer and operational data.
Juakali runs on Google Cloud Platform, with application workloads deployed in isolated environments designed for reliability, controlled access, and operational resilience. The platform supports field and back-office workflows with structured deployment processes and clear separation between production and non-production environments.
Google Cloud Platform hosting • Separate production and non-production environments • Secure application deployment workflows • Scalable application architecture • Controlled infrastructure access
Juakali applies standard security controls to protect data as it moves through the platform and while it is stored.
All traffic between user devices and the platform is protected over HTTPS/TLS. Authentication and session handling follow standard secure application practices.
Stored data is protected at rest within the platform infrastructure using managed security controls and restricted access practices.
. At the end of the pilot, we provide a detailed Pilot Assessment Report that includes impact analysis, key numbers, and challenges.
Access Control
Access to Juakali is managed through role-based permissions and internal access controls. The goal is simple: users should only have access to the data and actions required for their role.
Role-based access control • Least-privilege access principles • Restricted administrative access • Internal approval for sensitive access • Auditability of important actions
Customer Data Isolation
Juakali is designed so that each customer organization's data remains separated from other organizations using the platform. This helps maintain confidentiality and supports controlled access across customers and teams.
Data separation • Separate database schemas • Multi-tenant architecture
Backups, Monitoring, and Recovery
Access to Juakali is managed through role-based permissions and internal access controls. The goal is simple: users should only have access to the data and actions required for their role.
Role-based access control • Least-privilege access principles • Restricted administrative access • Internal approval for sensitive access • Auditability of important actions
Availability and Continuity
Juakali is used for operational workflows that teams depend on every day. The platform is therefore managed with a focus on stability, recoverability, and practical continuity for field and back-office teams.
Scalable application services • Redundant managed infrastructure • Recovery procedures • Ongoing performance monitoring
If you believe you have identified a potential security issue, contact us and we will review it promptly through our internal process.