top of page

Security Statement

Dataswitcher understands that the security of information it controls or processes is vital. We therefore ensure that all information we disseminate, produce, manage or store, is subject to best practice security and confidentiality procedures. We protect our data from internal, external, deliberate or accidental threats.

To pursue these goals we will:

  • Ensure that all information is treated with appropriate confidentiality

  • Maintain the integrity of all such information

  • Comply with all applicable statutory and regulatory requirements

  • Ensure that we have business continuity management procedures in place

  • Increase staff awareness of information security management through education and training

  • Perform penetration tests to prevent unauthorised access to our systems

 
Under this policy:

  • All breaches of information security, actual or suspected, will be reported to and investigated by our Chief Technology Officer

  • Information Security documents and training will be made available to all employees in our company

  • All managers will ensure that every staff member adheres to our policies and procedures

Our Security Infrastructure

Dataswitcher provides state-of-the-art security to ensure that customer data is never compromised.

 

Security measures include:

  • Experienced, professional engineers and security specialists dedicated to data and systems protection

  • Continuous deployment of proven, up-to-date security technologies

  • Ongoing evaluation of emerging security developments and threats

  • Redundancy throughout our online infrastructure

Our software is configured by experts and rigorously tested before going into production. By using AWS hosting facilities (in Dublin and Amsterdam) we adhere to world-class security policies including proven, up-to-date firewall protection, intrusion detection systems, TLS encryption, physical and other security controls.

Data Encryption

We use the strongest encryption products to protect customer data and communications, using industry standard encryption algorithms and transport layer security.

Application Security

Our robust application security model prevents one customer from accessing another’s data. This security model is reapplied with every request and enforced across all servers for the entire duration of a user session.

Internal Systems Security

Inside of the perimeter firewalls, our systems are safeguarded by network address translation, port redirection, IP masquerading, and non-routable IP addressing schemes.

bottom of page