Our technology is designed to offer the high service levels and best in class security to ensure our services are always available and meet the standards required for the accreditations we meet.
Multiple types and firewall layers to ensure we are not vulnerable to zero day attacks
Production systems follow a principle of least privilege access and all work is time stamped and logged
Only access is given to those who use it
Systems run in a containerised environment and are automatically distributed
Continuous deployments are made in a development environment and automatically tested
Code dependencies are locked and scanned daily against vulnerabilities
For detailed information on our techniques in data privacy in read our Executive Security Briefing.