Cyber security
engage|ats utilises multiple protocols and processes to ensure that any cyber security threats are mitigated as much as possible. These processes and protocols are regularly reviewed both internally and independently using a CREST certified Cyber Securtity agency.
Some of the security features in place
Whilst non-exhaustive, the following list gives a high-level summary of some of the methods engage|ats uses for protection against Cyber attacks:
-
- DDoS Protection
- Network threat monitoring
- OWASP application firewall
- TLS version 1.2
- Encryption at rest
- Independent Pen tests twice a year – minimum
- Anti-virus software
- Independent monitoring
- Access logs
- Failover capability
Tip: A more comprehensive list of all our processes and protocols that protect against Cyber attacks is available to all engage|ats clients.
Need some help?
We regularly respond to prospective clients requests for additional security information through a tendering process with an NDA in place.
Getting Started
Setting up engage|ats is simple and quick, we can even help you: