| Do you have a security and privacy program with documented policies? | Yes, we maintain a formal Information Security Management System (ISMS) aligned with ISO 27001 and a Quality Management System (QMS) aligned with ISO 9001. These include documented policies covering information security, privacy, access control, cloud usage, and incident response. Policies are reviewed and updated regularly to reflect evolving risks and regulatory requirements. |
| Are your privacy and security policies publicly available? | Yes, our core policies, including Privacy, Information Security, and Quality, are published on our website for transparency and stakeholder assurance. |
| Is there a designated security/privacy lead? | Yes, a Chief Information Security Officer (CISO) or equivalent role is responsible for overseeing our security and privacy programs, ensuring compliance, and managing risk. |
| Who can be contacted for security/privacy enquiries? | Security and privacy-related inquiries can be directed to our CISO or designated security contact, whose details are available upon request. |
| Do you hold any security or privacy certifications? | Yes, we are certified under ISO 27001 for information security and ISO 9001 for quality management, demonstrating our commitment to best practices and continuous improvement. |
| Do you provide security awareness training? | Yes, all staff undergo security awareness training during onboarding and annually thereafter. Training covers key topics such as data protection, phishing, social engineering, and incident reporting, with regular updates on emerging threats. |
| How are security and privacy policies enforced and communicated? | Policies are enforced through onboarding, annual training, and regular internal communications. Updates and reminders are issued by our security team to ensure ongoing awareness and compliance. |
| Can you demonstrate compliance with your security and privacy program? | Yes, we hold ISO 27001 and ISO 9001 certifications, undergo annual external audits, and conduct regular internal audits to validate the effectiveness of our controls. |
| Do you assess compliance of third-party vendors? | Yes, all third-party vendors are subject to annual reviews and must comply with our security and privacy requirements as outlined in our vendor management policy. |
| Do you assess third-party vendors and control their data access? | Yes, all third-party vendors are subject to due diligence and annual reviews. Access to client data is restricted and only granted under specific, controlled circumstances, if at all. |
| Do you have an incident response policy? | Yes, we maintain a documented Incident Response Plan that defines security incidents and data breaches, and outlines procedures for detection, reporting, and resolution. |
| Do you have a business continuity plan? | Yes, we have a Business Continuity and Disaster Recovery Plan that ensures operational resilience and service availability during disruptions. |
| What are your backup and restore processes? | Daily backups are performed with 7-day retention and point-in-time recovery. Systems are designed for high availability with automated failover. RPO is 12 hours and RTO is 3 hours, with coordinated backups ensuring consistency across systems. |
| What are your Recovery Time Objective (RTO) and Recovery Point Objective (RPO) in a business continuity or disaster recovery scenario? | Our disaster recovery framework is designed to ensure rapid service restoration and minimal data loss: Recovery Point Objective (RPO): 12 hours. Recovery Time Objective (RTO): 3 hours. These targets support business continuity by minimising downtime and preserving data integrity during unexpected disruptions. |
| What disaster recovery (DR) arrangements are in place, and how are they tested? | Our disaster recovery framework includes the following:
Testing Frequency: DR procedures are tested biannually to ensure readiness.
Last Test: Conducted in March 2025.
Test Outcome: Successful, with a Pass, Satisfactory - rating. A summary report is available upon request.
DR Infrastructure: On-premise coordination from our UK office. Cloud-based infrastructure hosted on Amazon Web Services (AWS), providing high availability, redundancy, and failover across multiple availability zones. |
| How do you manage ongoing compliance and regulatory updates? | We monitor regulatory changes, maintain a dedicated compliance team, and implement updates through automated rule changes. Clients are kept informed, and regular audits ensure continued compliance. |
| Do you have a data access control policy with monitoring? | Yes, access to systems and data is governed by a formal Access Control Policy. Access is role-based, granted on a need-to-know basis, and monitored using security tools to detect unauthorized activity. |
| Do you monitor system access? | Yes, system access is controlled and continuously monitored using tools such as Security Information and Event Management (SIEM) and Intrusion Detection Systems (IDS). |
| How is user management handled in your solution? | User access is managed through role-based controls aligned with organisational structure, following OWASP best practices for authentication and session security. |
| Do you support SSO via Azure AD? | SSO via Azure AD is planned for a future release. |
| Do you enforce a password policy and MFA? | Yes, we enforce a strong password policy and require Multi-Factor Authentication (MFA) for all users to enhance account security. |
| What is your solution’s IT architecture? | Our solution is hosted on AWS using Docker containers managed via ECS for scalability and high availability. The backend is built with Java 17 and Spring Boot, while the frontend uses Vue.js. PostgreSQL is used for data storage via AWS RDS. CI/CD is managed with Jenkins and Terraform, with full encryption and monitoring in place. |
| Briefly describe your technology stack. | Our stack includes Java, Spring Boot, Vue.js, PostgreSQL, and Docker, hosted on AWS. We use JWT for authentication, REST APIs for integration, and tools like Sisense and Jasper for reporting. |
| What is your underlying technology and database stack? | We use Java 17 with Spring Boot for backend, Vue.js for frontend, and PostgreSQL 13 for data management. The platform is hosted on AWS and uses Docker, Jenkins, and Terraform for CI/CD and infrastructure automation. |
| Can you provide a high-level architecture diagram? | Yes, a high-level architecture diagram is available upon request. |
| Where are your systems and data hosted? | All systems and data are hosted on AWS in the EU (Ireland region). Data is replicated across availability zones for resilience and complies with GDPR. |
| Do you manage your own data centers? | No, we use secure, geographically appropriate cloud infrastructure (e.g., AWS in Europe) to host our applications and data, benefiting from their physical and logical security controls. |
| Do you use a CMDB with automated asset discovery? | Yes, we maintain a Configuration Management Database (CMDB) that supports automated discovery of IT assets, helping ensure accurate inventory and change management. |
| Do you outsource any part of the service? | No core services are outsourced. Cloud hosting is provided by AWS, and internal support may be provided by a wholly owned subsidiary under full governance. |
| Is sensitive data encrypted in transit? | Yes, all data transmitted over networks is encrypted using industry-standard protocols such as SSL/TLS to ensure confidentiality and integrity. |
| Is sensitive data encrypted at rest? | Yes, data stored in our systems is encrypted at rest using secure encryption standards to protect against unauthorised access. |
| How is the system accessed and is data encrypted? | The system is accessed via secure internet connections using standard web browsers. Data is encrypted in transit using TLS and at rest using AES-256 encryption. |
| How is data security maintained during testing and implementation? | All development and testing are conducted in isolated environments using sandbox data, no client data is used. Developers have no access to production systems. Clients are provided with test environments and portfolios to validate rules and scenarios safely before going live. |
| Does your solution support REST APIs? | Yes, our platform is built with an API-first approach and supports RESTful APIs for all core functionalities. |
| How is API authentication handled? | Authentication is managed using JWT tokens issued after login. |
| How is API authorization handled? | Authorization is role-based, with permissions configured to control access to specific data and features. |
| Is any software installation required on client systems? | No, our solution is delivered as Software as a Service (SaaS), requiring no installation or access to client infrastructure. |
| How is your software updated? | We use a Continuous Integration/Continuous Deployment (CI/CD) approach to manage software updates. This ensures timely deployment of new features, patches, and security fixes. |
| Describe your release management process. | We follow a CI/CD process for automated deployments, ensuring timely and reliable software releases. |
| How are patches and hotfixes applied? | Patches and hotfixes are deployed through our CI/CD pipeline to ensure rapid and consistent updates. |
| What is your upgrade and release methodology? | We use Agile and CI/CD for automated deployments. Releases undergo automated and manual testing in a staging environment. Clients are notified in advance of scheduled updates and receive release notes post-deployment. |
| What server logs do you maintain and how are they monitored? | We use a centralized monitoring platform to collect and analyze server logs, including system events, access logs, and performance metrics. Logs are continuously monitored for anomalies and retained per our data retention policy. |
| Do you perform vulnerability scanning and penetration testing? | Yes, we conduct regular automated vulnerability scans and annual third-party penetration tests to identify and remediate security risks. |
| Do you have a server update and patching policy? | Yes, we follow a structured patch management process as part of our CI/CD pipeline to ensure timely updates in response to security threats and software improvements. |
| Do you have a server security policy and how is data integrity maintained? | Yes, our server security policy includes controls for secure configuration, monitoring, and data integrity. We use cloud-native tools and best practices to manage and protect our infrastructure. |
| How is capacity management handled in your product? | Capacity is managed through continuous monitoring of our cloud infrastructure, with auto-scaling and proactive traffic analysis to ensure optimal performance. |
| What scalability options are available (horizontal/vertical/storage)? | Our solution supports both horizontal and vertical scaling using cloud-native auto-scaling features, with flexible storage capacity to meet growing demands. |
| Are there any capacity limits? | There are no fixed limits. Resources scale dynamically based on usage patterns and system demand. |
| What are your standard response times for user queries? | Response times vary by query type and severity. Performance is continuously monitored to meet service expectations. |
| What are your daily operational activities (e.g., batch jobs, file transfers)? | We run scheduled batch jobs for data processing and reporting, perform daily database backups, and support secure file transfers via SFTP. Systems are continuously monitored and auto-scaled for performance and reliability. |
| Do you have an equipment disposal policy? | Yes, we follow a formal IT asset disposal policy that ensures secure decommissioning and data sanitization of all hardware in compliance with industry standards. |
| What is your process for bespoke development requests and are enhancements included in the contract term? | Clients can submit bespoke development requests via their Relationship Manager. Each request is reviewed for feasibility and alignment with our roadmap. Approved items are prioritized and scheduled based on impact and complexity. Most enhancements are included at no extra cost, and clients are kept informed throughout. Custom reports can also be developed as needed. |
| Do clients contribute to product development? | Yes, client feedback is actively encouraged and incorporated through relationship managers and feedback sessions. Requests are evaluated and prioritized based on broader client benefit. |
| What are your strategic plans and roadmap? | We maintain roadmaps for infrastructure, product, and specific modules. These are aligned with client needs, regulatory changes, and innovation goals. Key items include AI enhancements, workflow automation, and jurisdictional updates. |