FAQ – Security, Architectuur & Enterprise

Keypact uses Post-Quantum Cryptography (PQC). This protects data against future quantum computing attacks and ensures long-term confidentiality.

The architecture is horizontally scalable to over 100,000 users per cluster with support for redundancy and load balancing.

Pro (€10 per month) offers full collaboration without limitations. Enterprise Cloud (€8 per month) adds organization management, audit logging, SSO, API, and a custom domain name.

BYOK (Bring Your Own Key) means that your organization manages the encryption keys itself via your own KMS or HSM.

Keypact uses Post-Quantum Cryptography (PQC). This protects data against future quantum computing attacks and ensures long-term confidentiality.

The architecture is horizontally scalable to over 100,000 users per cluster with support for redundancy and load balancing.

Keypact uses Post-Quantum Cryptography (PQC). This protects data against future quantum computing attacks and ensures long-term confidentiality.

The architecture is horizontally scalable to over 100,000 users per cluster with support for redundancy and load balancing.

Pro (€10 per month) offers full collaboration without limitations. Enterprise Cloud (€8 per month) adds organization management, audit logging, SSO, API, and a custom domain name.

BYOK (Bring Your Own Key) means that your organization manages the encryption keys itself via your own KMS or HSM.

Keypact uses Post-Quantum Cryptography (PQC). This protects data against future quantum computing attacks and ensures long-term confidentiality.

The architecture is horizontally scalable to over 100,000 users per cluster with support for redundancy and load balancing.

Pro (€10 per month) offers full collaboration without limitations. Enterprise Cloud (€8 per month) adds organization management, audit logging, SSO, API, and a custom domain name.

BYOK (Bring Your Own Key) means that your organization manages the encryption keys itself via your own KMS or HSM.

BYOK (Bring Your Own Key) means that your organization manages the encryption keys itself via your own KMS or HSM.