Customer trust and secure services are critical to everything we do at Quantify

Compliance

Cloud Security Alliance

Quantify has performed the CSA self-assessment questionnaire. The report is available to our clients and interested parties upon request.

Cloud security program

Quantify has completed the Atlassian Marketplace cloud security self-assessment and shared the results with Atlassian.

Network and application security

Data Hosting and Storage

Our services and data are hosted in Amazon Web Services (AWS) facilities (us-east-1) in the USA.

Failover and Disaster Recovery

Our applications are built with disaster recovery in mind. All of our infrastructure and data are spread across 3 AWS availability zones and will continue to work should any one of those data centers fail.

Network isolation

All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACLs) that prevent unauthorized requests getting to our internal network.

Back Ups and Monitoring

Customer data is backed up on a regular basis. Services are monitored for availability.

Permissions and Authentication

Access to customer data is limited to authorized employees who require it for their job.We use 2-factor authentication (2FA) and strong password policies where possible to ensure access to cloud services are protected.

Encryption

All data sent to or from Quantify is encrypted in transit and at rest use minimum 256-bit encryption.

Pentests, Vulnerability Scanning

Quantify uses third party security tools to continuously scan for vulnerabilities.

Incident Response

Quantify implements a protocol for handling security events which includes escalation procedures, rapid mitigation and post mortem.