Security and Infrastructure

We understand that security and reliability are paramount, so we’ve utilised the most technically advanced and secure enterprise application architecture available so that you can rest assured that your data will be safe and secure, no matter what.

High Availability

24x7x365 service availability with fully redundant servers, automatic failover, load balancing and real-time geo-replication means you can access our system from anywhere at any time, even if a disaster took out one of the data centres.

Data Sovereignty

Your data stays where you want it to and never leaves the designated region which you select. Replication of data occurs within the same region to fully redundant servers so we can guarantee that your data remains in the same legal jurisdiction at all times.

Privacy and Security Compliance

Our cloud-based platform complies with all the latest privacy and security policies including ISO/IEC 27001 & 27018, CSA STAR, CJIS Security Policy, HIPPA BAA and IRS 1075.

Disaster Recovery

In the event of a situation occurring where an entire data centre is taken offline, our traffic management system will automatically failover to it’s paired redundant sibling, located in the same geographic region ensuring constant availability with zero data loss.


We take security extremely seriously and engage the services of a leading security consultant to advise on policies, procedures and technologies to ensure we are to provide the most sophisticated protect for your data from hackers and malicious users.

Penetration Testing

Hackers are constantly innovating and zero-day vulnerabilities are inevitable so we frequently test our systems using white hack security services to simulate malicious attacks on our services to ensure we have the highest possible protection.

Active Monitoring

Our platform is monitored 24/7 by a professional team of engineers who use automated tools and cutting-edge threat management strategies to strengthen threat detection, response and defence for our cloud-based service.


Data is encrypted while at rest and in motion. A combination of AES-256 disk encryption, Transparent Data Encryption, TLS/SSL and IPsec ensures at no time is any of your data unencrypted.