Trust Centre

Information security is at the core of what we do

JAVLN’s trust and compliance systems support the security, confidentiality and availability needs and expectations of customers. Our team works with you to maintain a program designed to mitigate risk and educate users on how to safely use our software.

Ask a question
  • Security

    Protecting data

    We encrypt all data that goes between you and JAVLN, in transit and at rest using the latest industry standards.

    We integrate with directory services to enable company-wide access controls including SSO and MFA.

    We engage specialist security professionals to conduct annual penetration tests and we perform continuous vulnerability scanning.

  • Confidentiality

    Protecting secrets

    We comply with applicable privacy and data protection laws when processing personal information. We go beyond personal information protection and safeguard any business IP or secrets that are shared with us.

    Any classified confidential information is only accessed by authorised personnel, for the intended purpose and duration before it is disposed of by adhering to our compliance obligations.

  • Availability

    Built on AWS

    Multiple layers of security controls protect access to and within our environment, including firewalls, intrusion protection systems, network segregation and continuous monitoring.

    We maintain separate availability zones, data replicas and hosting environments to minimise the risk of data loss or outages. JAVLN has been designed to grow with your business. Our high performance servers, networks and infrastructure ensure we can deliver quality, scalable services.

  • Compliance

    Security assurance

    We maintain a compliance program that includes annual independent third-party audits to attest our products and services against SOC 2 standards. Our latest SOC2 Type2 2023 Report is available upon request.

    JAVLN is a business partner with the ACSC and CERT NZ, both are government agencies that provide security advice and notification of emerging cyber threats.

Webinar: How to Unlock Operational Efficiencies Through Technology - May 14, 12pm AEST  Register Here
close
open