We understand what our customers need because we use our platform just like they do.
We achieved ISO 27001 certification first time, just like every organisation that follows our Assured Results Method. Since then we’ve used our platform to maintain that certification and show compliance with other standards and regulations.
Our primary data centre hosting supplier, based in the UK, has world-class information security measures and certifications in place. We also have data centres in Europe, USA and Australia that adhere to the same high standards.
View our certificatesGDPR Compliant
We follow the UK ICO checklists for GDPR and Data Protection Act 2018, ensuring we handle personal data responsibly and in accordance with the law.
Single Sign-On
We support Single Sign-On (SSO). We can work with an ever-growing list of identity providers, including Google, Microsoft Azure Active Directory and Okta. It’s simpler and more convenient for users, and much more secure too.
We’re cloud secure
We follow the UK National Cyber Security Centre’s Cloud Security Principles. They’re 14 principles that make sure we securely configure and deploy our cloud-based services. That keeps you safe as you use them.
2 Factor Authentication
We offer two-factor authentication (2FA) for all our customers. Wherever possible, our people use 2FA for the services that help them deliver and support ISMS.online. That adds an extra layer of security to both our platform and our supplier relationships.
Penetration Tested
Our platform and infrastructure undergo a penetration test in line with CHECK testing standards at least once a year. We also run one if there are material changes to either of them. And we’ve been rated A+ by independent SSL inspectors using the Qualys review process.
Other safeguards
We follow a range of other data protection safeguards, in line with GDPR. Our service includes everything you’d expect from a smart SaaS service with strong security options and great privacy controls at levels of work and access permission management. We’ve detailed them in our Terms and Conditions.
HMG Security Policy Framework
We meet the HMG Security Policy Framework requirements and its related policies and controls. For example, we run Baseline Personnel Security Standard (BPSS) checks and other vetting on new hires.
Vulnerability scans
To ensure we keep your platform safe and secure, we conduct a vulnerability scan on every deployment of either the ISMS.online application or infrastructure it runs on. This is done both during development and before deployment and is in addition to the external pen testing we have run against the platform.
Four data centres
We have four data centres with world-class information security measures and certifications in place, based in the UK, Europe, USA and Australia. For real-time updates on our operational status, please visit our status page.