Our policies are standardised
Our security policies are written consistant with a ISO27001 typology.
We conduct hardening on our networks and servers
We pursue standard CIS guidelines where appropriate to keep our infrastructure safe
Our platform is subjected to routine penetration testing
We engage a third party to find security gaps and any vulnerabilities found are promptly patched.
We implement encryption everywhere
All our data is encrypted using standard best practice algorithms in our database and in transit. These protocols are updated in line with industry standards.
We support our shared security model
We evangelise our security first-commitment when engaging and supporting our clients so that they understand and mitigate the risks implicit in end-user operations.
We follow best authentication and authorisation practices
For all clients we offer a range of options for securely authenticating into the system. This includes Single Sign On via OAuth or SAML, Multi-Factor Authentication and others.