Security &
Trust

Work confidently using reliable and secure enterprise technology.

security-trust

The Checkbox platform is highly secure with layers of technical and operational controls in place to protect information. Checkbox maintains an Information Security Management System as part of its governance framework which includes policies and procedures around network security, information handling and data security, access control, incident response, backups, change management, risk management, vulnerability and patch management, and vendor risk management.

Checkbox has been architected for security. Some of our controls include:

checkbox-cube

Encryption of data at rest and in transit

checkbox-cube

Automated security patching

checkbox-cube

Antivirus scanning

checkbox-cube

Network-based Intrusion Detection Systems (NIDS)

checkbox-cube

Regular automated vulnerability scanning

checkbox-cube

Regular web application penetration testing

checkbox-cube

Hardened Standard Operating Environment images

checkbox-cube

Firewall policies at the host and service level (micro network segmentation)

checkbox-cube

Monitoring and logging of all administrative access and network traffic flows

deloitte-logo
cca
allianz
hesta
quantium
telstra
clayton-utz
Hall & Wilcox
mcabe
0237_637159469376197347
carroll-odea
gt
sh
rajah-tann
croftbridge
lexisnexis-logo
sal
singapore-law-society
woolworths-albury
uts
picture20
australian-cross
finlab
standards-au

Access Our Security Documents

Get access to our ISMS including policies, penetration tests and SOC2 audit reports.

Request Security Docs