Security & Privacy

For 25 years, we've helped organizations manage recruitment with confidence - not just through product features, but by protecting the sensitive data they entrust to us. We don't just follow minimum standards, we build above them. Our approach to security reflects maturity, not just compliance.

Resilient, Encrypted, and Recoverable

Daily automated full backups with geographic redundancy

Redo logs archived every 5 minutes

All data (including backups and logs) encrypted at rest

Best-practice key management

Low RPO and point-in-time recovery, minimizing potential data loss

Per-customer backup and data handling to avoid collateral impact in the event there were ever an incident

Customer first security by design

While some vendors are building features for investors or exit strategies, we build for longevity and trust. Many ATS vendors say "secure by design." We prove it in our architecture stack

True single-tenant isolation - Dedicated database per customer for full data isolation

  • Each customer's data is stored in their own dedicated database, not a shared cluster or partitioned table.
  • Not just shared infrastructure with flags

No shared schemas or noisy neighbors to worry about

  • Protection from noisy neighbor issues, where heavy usage by one customer can degrade performance for others
  • Complete data segregation, eliminating the risk of accidental or unauthorized cross-tenant access

Operational independence (we scale, backup, and restore each customer individually)

  • Operational flexibility, including customer-specific backup, restoration, scaling, and retention policies

Zero tolerance for cross-tenant risk in architecture or operations

Independence is Integrity

We're not VC-backed. We're not chasing growth at the expense of security. 
Align with customer needs, rather than milestones

While some vendors pivot with market pressure, we've stayed true to one thing - building trustworthy software for organisations who value it.

Automated daily backups with geographic redundancy: We perform automated daily backups of each customer's database, with backups stored in geographically separate locations to protect against data loss from failures or disasters. All backups are encrypted at rest using strong, industry-standard encryption algorithms to ensure confidentiality and integrity.

Our database infrastructure enables a low Recovery Point Objective (RPO) - allowing us to provide point in time recovery with minimal loss (< 5 minutes). This setup provides a strong foundation for disaster recovery, business continuity, and customer peace of mind.

You're trusting us with critical data

We know what's at stake. Candidate resumes and PII data, hiring decisions, and proprietary company information flow through our system every day. That's why we designed our product to exceed expectations, and quietly raise the bar for everyone else.

Instead, we focus on

Stability over hype: Features are thoughtfully built, security-reviewed, and operationally sound before they launch.

Long-term alignment: Our priorities are driven by what our customers need to hire effectively and securely - not by quarterly growth targets.

Accountability that lasts: We've been here for over 2 decades years, and we're committed to being here for the same again.

If your current vendor is optimizing for their next funding round, you should ask where that leaves you when their priorities shift.

Recruitment technology that works for you.

Connect with qualified candidates faster, personalise every step of the hiring journey, and enjoy modern, flexible tools that deliver results an a way that works best for you.

test
Jean Doe
Hiring manager
test
Kai Grange
Agency user
test
Scott Brandon
Recruiter
test
Jordan Pear
People & Culture