man developing workflow on tablet
woman managing documents on laptop

Penetration testing

We conduct regular testing to help ensure that our defenses are sufficiently keeping up with current-day vulnerabilities that could be exploited.


Vulnerability assessment

Origami Risk uses state-of-the-art tools to regularly perform scans for vulnerabilities within our information system and client applications.


SSO & user security

Our role-based security provides clients the ability to easily manage their users’ access and capabilities down to the field level and can accommodate Single Sign-On authentication.



All data is encrypted in transit and at rest, databases use file-level encryption, and web traffic is encrypted using Transport Layer Security (TLS), all within our AWS Elastic Cloud environment.


Intrusion detection & prevention

We utilize tools to establish a security perimeter that provides us with real-time alerts of suspicious activities and traffic that are indications of an active or attempted compromise.


DNS security extensions

Origami’s public/private key cryptography creates a chain of trust and provides validation that ensures users are connecting to the correct domain no matter their location.