Cyber Essentials Certified

Security at Tracesavvy

We protect your data and support audit-ready operations through comprehensive security controls, continuous monitoring, and industry-standard best practices.

Security Overview

Built with security at the core, not bolted on as an afterthought.

End-to-end encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256)

Secure cloud hosting

Hosted on enterprise-grade infrastructure with 99.9% uptime SLA

24/7 monitoring

Continuous system monitoring and security event detection

Least privilege access

Role-based permissions ensure users only access what they need

Comprehensive audit logs

Complete traceability of all system actions and data changes

Secure development

Regular security testing, code reviews, and vulnerability scanning

Automated backups

Daily encrypted backups with point-in-time recovery

Cyber Essentials Certified

UK government-backed certification for cyber security best practices

Access Controls & Audit Trails

Role-based access control

Granular permission systems ensure users only access the data and functions they need for their role. Administrators can define custom roles, assign permissions, and review access levels across the organization.

Account security

Strong password requirements, session management, and optional multi-factor authentication protect user accounts. Failed login attempts are monitored and suspicious activity is flagged automatically.

Complete traceability

Every action in the system is logged with a timestamp, user identity, and action details. This creates a complete audit trail for compliance reviews, internal investigations, and operational analysis.

What we log

  • User logins and authentication attempts
  • Record creation, updates, and deletions
  • Data exports and report generation
  • Permission changes and role assignments
  • Administrative actions and configuration changes
  • Failed access attempts and security events

All audit logs are tamper-proof, timestamped, and available to account administrators through the platform.

Data Retention & Backups

Data retention

Production and traceability data is retained to support regulatory compliance and operational needs.

Specific retention periods are defined in your service agreement and are available on request.

Automated backups

Daily encrypted backups with continuous point-in-time recovery capability ensure your data is protected against loss or corruption.

Backups are stored in geographically separate locations for resilience.

Business continuity

Redundant infrastructure, automated failover, and tested disaster recovery procedures minimize downtime.

Our systems are designed for high availability with 99.9% uptime SLA.

Incident Response Posture

Detection

24/7 monitoring systems identify anomalies and potential security events in real time.

Triage

Security team assesses severity, scope, and impact of detected incidents.

Containment

Immediate action to isolate affected systems and prevent further impact.

Communication

Affected customers are notified promptly with clear information and guidance.

How to report a security issue

If you discover a security vulnerability or have concerns about the security of our systems, please report it immediately. We take all security reports seriously and investigate them promptly.

[email protected]
We respond within 24 hours

Security FAQ

Common questions about our security practices

Need our security details?

We're happy to provide additional security documentation, compliance certificates, and answer specific questions about our security posture.