top of page


We take this quite seriously, so that you don't need to lose sleep over this.


Access Control


Users only see information to which they have access. That means, different users can only view, download, publish and/or print to where you grant access.

Data Storage


All personal data is stored encrypted and is hosted in secure, ISO 27001 compliant data centres in the UK.


Application Security

Independent security and penetration testing audits to ensure that personal information is always secure.



You can set your own password. Our default security policies enforce a secure password. You can also set login parameters such as length and complexity of passwords, and you can also determine how frequently your users need to reset their password.


Data Ownership

You own and control the data entered on your systems by your employees or by us on your behalf. Simple.

Firewalls & IP Whitelisting


All servers are protected by separate hardware firewalls, which deliver high performance (as to not inhibit speed of service) and multi-threat protection.

Logins to your systems can be restricted only from your whitelisted IP addresses.


Proactive Monitoring


We proactively monitor our systems 24*7*365 for any vulnerabilities and unauthorised access attempts, thereby ensuring that your data is never at risk.

You also get a monthly report of active users on your systems. You can (with admin access) disable those users that are not needed any more. You can see logged in users and their IP addresses at any time by going to our security page.

Failed password attempts on your systems are also notified to you.

bottom of page