Security & Compliance

We understand the importance of properly managing, controlling, and protecting our infrastructure and information. To ensure this, we have a dedicated team overseeing our comprehensive security program. This includes network and application security, identity and access management, change control, vulnerability and penetration testing, log and event monitoring, vendor risk management, physical and endpoint security, governance and compliance, HR security, disaster recovery, and many other critical measures.

Encryption

We protect data and systems using a range of technologies and methods. One key approach is encryption: all data is encrypted both in transit and at rest. In certain cases, we also provide encryption while data is in use.

Security Accreditations

Security is at the heart of everything we do. We comply with UK Government Cyber Essentials standards and operate from accredited data centres certified to ISO 27001, ISO 9001, ISO 20000-1, ISO 22301:2019, and other industry-leading standards.

Vetting & Background Checks

Everyone working with or for us undergoes thorough vetting and background checks before starting, and these checks are repeated regularly throughout our ongoing relationship.

Auditing, Logging & Alerting

We have comprehensive logging, monitoring, and alerting across our entire infrastructure, along with regular internal and external audits to ensure everything stays secure and compliant.

Security Operations Centre

Our security team works 24/7 to manage, monitor, prevent, detect, analyze, and respond to any anomalies, threats, events, or incidents across our entire infrastructure.

Stringent Governance

We maintain organization-wide documentation, policies, and procedures that guide our operations, outline best practices, and define how we respond to various situations.

Technical Security Information