Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
English (US)
US English (US)
CO Spanish (Colombia)
  • Home
  • Cibersecurity and Compliance

How Do Wolkvox Applications Perform Encryption in Transit and at Rest?

Written by Jhon Bairon Figueroa

Updated at November 6th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • wvx Digital Interaction
  • wvx Voice Interaction
  • wvx Conversational AI
  • wvx Control Interactions
  • wvx CRM
  • wvx Agent
  • wvx Studio
  • Cibersecurity and Compliance
  • Release
    wolkvox Manager release wolkvox Agent release wolkvox CRM release
+ More

Table of Contents

Description Features

Description

Wolkvox applications implement encryption in transit and at rest as a fundamental part of their security strategy, following industry-recognized standards. To ensure the confidentiality, integrity, and authenticity of data, advanced encryption protocols are used for both transmission and storage. In collaboration with Google Cloud Platform (GCP), Wolkvox ensures that all information is protected against unauthorized access, leaks, or tampering, complying with regulations such as ISO 27001, GDPR, and PCI DSS.

 

Features

Encryption in Transit

  • Secure Protocols: All communications between Wolkvox clients, servers, and services are conducted via HTTPS with TLS 1.2 or higher, ensuring that transmitted data is encrypted and protected against interception.
  • Digital Certificates: Use of valid and up-to-date SSL/TLS certificates to authenticate connections and prevent attacks like "man-in-the-middle."
  • Cloud Protection: GCP automatically encrypts traffic between internal and external services, using TLS for the transport layer and ensuring data never travels in plaintext.

 

Encryption at Rest

  • AES-256 Standard: Data stored in databases, disks, and backups is encrypted using AES-256, one of the most robust algorithms available.
  • Key Management: Encryption keys are managed through GCP’s specialized services, such as Cloud Key Management Service (KMS), allowing strict control and auditing of their use.
  • Default Encryption: Google Cloud applies automatic encryption to all data at rest, including information stored in databases, files, and backups.

 

 

application security encryption methods

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Por que el reporte 1 de chat no me coincide con la información que se muestra en Data Monitor
  • De qué forma se ajusta la zona horaria para descargar reportes y consumir APIs

2025 Wolkvox

Information security policy | Privacy Policy

Expand