Our security program evaluates, monitors and improves the security posture of our underlying systems on a regular basis. The program is comprised of technology (software) and as well as policies (legal agreements) and procedures.
Our technology (application, services, data) is hosted in the cloud on logically isolated servers behind a comprehensive firewall with monitoring and alarms on each system. Access to our systems is limited by a centralised access-control list with multi-factor authentication required for all users.
Redundancy & Resilience
Our server side architecture is designed for scale and redundancy with daily backups, load balancing, and cross-region replication. Through auto-scaling functionality, we’re able to add additional servers on-demand to ensure the highest levels uptime, response time and performance.
Logging & Monitoring
We conduct system and application logging of all interactions, including access to APIs, giving us the ability to quickly investigate issues and identify concerns. We have a comprehensive network monitoring program in place with alarms to notify key personnel in the event of an outage, attack or breach.