Data security is our highest priority

Keeping our client data secure is at the heart of everything we do. We are certified against the world’s most rigorous Information Security Management System (ISMS) standard, so you can remain assured that we store your data safely.

International compliance: ISO 27001:2013

We are one of only 400 Australian businesses and organisations to have been successfully certified against ISO 27001:2013. As the leading global standard for developing and maintaining an ISMS, certification ensures our team is following best practice to:

Protect client and employee information

Manage risks to information security effectively

Achieving certification against ISO 27001:2013 requires a stringent audit process

The SwiftFox team also operates under Australia’s only industry legislated privacy code, and is a member of the Australian Data and Insights Association (ADIA)

Data always stored in Australia

Our data is hosted in secure data centres in Australia through Microsoft Azure, providing our clients with safety, security and scalability.

Azure’s architecture is adjusted for the cloud environment in order to ensure 99.99% availability even in the cases of infrastructure failures. It also ensures:

Auto scalability

High resiliency and fast geo-recovery

Advanced data corruption protection

We are constantly reviewing and updating our systems to the latest versions to protect against vulnerabilities, and modifying our code to make use of new and better methods.

Australia data and insights association

We believe the most critical component of security comes from our daily actions. Therefore we operate on a least-risk basis, isolating data and keys as far as is practicable.

Our development machines are isolated from production code and data, and we regularly review incoming and outgoing logs in search of anomalies.

We share our policies with our clients, so you always know we are keeping your data safe. Our data security team is also able to answer any additional questions you have.

Two-factor authentication available

Audit logging of all user actions and logins

Key systems penetration tested