Help Center

Welcome to the Rekuway Help Center.

This space is designed to support customers, partners, and internal teams with common questions, operational guidance, and general assistance related to Rekuway.

If you don’t find what you’re looking for, our team is available to help.


Frequently Asked Questions (FAQ)

What is Rekuway?

Rekuway is an identity-first cybersecurity platform that provides adaptive protection at the authentication and access layer.

It is designed to silently protect digital environments by observing identity behavior and responding dynamically to suspicious activity.


Is Rekuway a firewall or WAF replacement?

No.

Rekuway complements existing security solutions such as firewalls, WAFs, IAM, and SOC tools.

Its focus is on protecting identity behavior during access events — an area often not covered by traditional security layers.


Does Rekuway affect legitimate users?

No.

Rekuway operates silently in the background and is designed to avoid friction for legitimate users.

Security responses are adaptive and targeted only at suspicious or high-risk behavior.


Does Rekuway store personal user data?

Rekuway follows a privacy-first architecture.

The platform does not profile users, does not sell data, and does not retain unnecessary personal information.

Security decisions are made using contextual signals rather than personal identity data.


Is Rekuway compliant with security best practices?

Rekuway is aligned with modern security principles, including:

  • Zero Trust architecture

  • Least privilege access

  • Defense-in-depth

  • Privacy by design

Specific compliance certifications may vary by deployment and customer requirements.


Account & Access

How do I get access to Rekuway?

Access to Rekuway is provided through a commercial agreement.

Once onboarded, customers receive credentials, documentation, and onboarding guidance tailored to their environment.


Can Rekuway be used in production environments?

Yes.

Rekuway is designed for production use and supports enterprise-grade environments, including high-availability and cloud-native architectures.


Is there a trial or evaluation period?

Rekuway may offer evaluation access depending on the engagement model.

Please contact the Rekuway team to discuss testing or pilot options.


Reporting & Insights

Does Rekuway provide reports?

Yes.

Rekuway provides monthly security reports that include:

  • High-level security activity summaries

  • Detected risk patterns

  • Defensive actions triggered

  • Operational insights

Reports are designed for both technical teams and decision-makers.


Can reports be customized?

Reporting capabilities may vary based on the service plan and deployment model.

Custom reporting options can be discussed during onboarding.


Support

How do I contact support?

If you need assistance, please contact:

📧 support@rekuway.com (example — adjust if needed)

Our support team will respond according to your service agreement.


What information should I provide when contacting support?

To help us assist you faster, please include:

  • Organization name

  • Environment (production, staging, etc.)

  • A brief description of the issue

  • Relevant timestamps (if applicable)


Security & Responsible Disclosure

How do I report a security issue?

Rekuway takes security seriously.

If you believe you have discovered a security issue, please report it responsibly by contacting:

📧 rekuway@gmail.com (example — adjust if needed)

Do not disclose security issues publicly before contacting us.


Legal and compliance information is available in the following sections:

  • Legal Notice

  • Privacy Policy

  • Terms of Service

These documents are part of the Rekuway documentation and apply according to your agreement.


Need More Help?

If your question is not covered here, please reach out to the Rekuway team.

We’re here to help you operate securely.


🛡️ Rekuway — Adaptive Identity Defense

Last updated