We follow strict internal protocols to maximise our security, routinely penetration and load testing our systems.

Built on Trusted Technologies

Our infrastructure makes use of managed services, provided by ISO 27001 and SOC 2 certified providers, ensuring that our services remain secure and reliable.

End-to-end Encryption

Our internal and external API traffic and data storage is encrypted end-to-end, with strong encryption meeting modern standards.

Automated Security Scans

Our code and dependencies are scanned constantly for security and supply chain issues by class-leading external tools. Fixes are automated wherever possible.

Regular Third-Party Security Audits

We engage a trusted third-party on a regular basis to audit both existing and new code and services that we run, to ensure we remain vulnerability-free.