Information and data security are at the heart of our architecture, engineering, and operations.
We are dedicated to provide our customers, partners and employees with the highest level of security assurance.
Our controls are designed to protect identities, devices, and data—across environments.
Access control is granted on the principle of least privilege. Users and services are only provided access to the information they require to perform their tasks and role. Access to systems is based on role, and access to data is based on roles and attributes.
We provide our users with an on-demand virtualized desktop experience delivered from a secure location. This ensures the user's workspace and the data is always protected irrespective of the device, location, and connection.
We are committed to processing data in accordance with its responsibilities under the Personal Data Protection Act (PDPA) of Singapore and Philippines Data Privacy Act (DPA) of 2012. Confidential information or personal data are encrypted at rest, in-use, and in transit by default.
We continuously monitor our compliance with security controls and get them externally audited against global frameworks.
Certificates and reports are provided upon request.