Security Overview

Transparency in Our Operations

Keeping your data and our infrastructure secure is paramount. This page outlines the services we utilize, the types of data they may access, and the policies that govern our security posture.

Filter by Data Type Access:

Showing all services. Select data types above to filter.

Infrastructure Providers

Identity & Access Management

Communication & Collaboration Tools

Developer Tools

Sales & Marketing Tools

Social Media Management

Support Tools

Security Tools

Management Tools

Partner Management

Vendor Portals & License Management

Infrastructure Management

Reporting & Analytics

Migration Tools

Legacy Systems

Operating Systems


Security Policies & Practices

Our commitment to security is formalized through comprehensive policies, procedures, and standard practices. Key points include:

  • Identity & Access: We utilize Microsoft 365 / Entra ID as our primary identity provider, enforcing strong MFA, real-time risk analysis, and conditional access policies for integrated applications.
  • Data Encryption: Data at rest is encrypted using platform-managed keys (e.g., AWS KMS in AWS, Microsoft Managed Keys in Azure). Data in transit is protected using TLS encryption.
  • Secrets Management: API keys and sensitive credentials are stored exclusively in approved, audited systems like AWS Secrets Manager, Keeper, or Hudu.
  • Source Code Security: Access to code repositories (GitHub) is protected by MFA, organization policies, periodic audits, automatic security scanning/linting, and automated secret scanning.
  • AI Platform Usage: For all AI platforms (e.g., OpenAI API, GitHub Copilot), we utilize paid tiers configured to prevent data ingestion for model training and human review, ensuring confidentiality. See linked provider policies for details.
  • Communications Policy: All business communications (emails, calls, messages, meetings) may be subject to recording, logging, and analysis (including by AI) for purposes of service provision/improvement, security, training, and documentation.
  • Cloud Backup Security: Our standard cloud backups utilize robust encryption both in transit and at rest. We aim for standard RTOs/RPOs suitable for business continuity, with specific details available in client agreements or BC/DR plans.
  • Privacy Policy: Details our practices regarding personal information across all Services (Website and MSP). View Privacy Policy.
  • Formal Documents: Comprehensive details are available in our internal Data Protection Policy, Business Continuity/Disaster Recovery (BC/DR) Policy, and Incident Response Plan. Access to additional documents may be available upon request for clients under NDA.

For specific questions or document requests (where applicable), please contact us.