Enterprise Technology

Security and Trust

Work confidently using reliable and secure enterprise technology

Information Security Controls

The Checkbox platform is highly secure with layers of technical and operational controls in place to protect information. Checkbox maintains an Information Security Management System as part of its governance framework which includes policies and procedures around network security, information handling and data security, access control, incident response, backups, change management, risk management, vulnerability/patch management, & vendor risk management.

Encryption of Data at Rest and In Transit

Automated Security Patching

Antivirus Scanning

Network-based Intrusion Detection Systems (NIDS)

Regular Automated Vulnerability Scanning

Regular Web Application Penetration Testing

Hardened Standard Operating Environment Images

Firewall Policies at the Host and Service Level (Micro Network Segmentation)

Monitoring and Logging of All Administrative Access & Network Traffic Flows

Checkbox is SOC 2 Certified

Checkbox has been externally audited against the security requirements of the SOC 2 framework, and has achieved SOC 2 Type II certification.

Checkbox is Trusted Globally by the Best

Access Our Security Documents

Get in touch to request Checkbox’s security documents including policies, penetration tests and SOC2 audit reports