Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items


At Red Marker, we understand that our cloud platform plays a key role in helping our customers protect one of their most important resources, their brand.

We take this responsibility seriously and use secure engineering principles to build our services, architecture, software, and systems. Security principles are designed into our software systems from the earliest development opportunity.

Importance of Information Security

The security of information is a core pillar of the products and services we deliver. We manage our privacy obligations to ensure the confidentiality, integrity and availability of information are in line with Australian and New Zealand, US and European Privacy legislation.

Dedicated Security Team and Security-centric Staff

Red Marker's experienced security team comprises Red Marker’s CTO and Information Security Manager who is a certified Information Security Manager (CISM).

As a SaaS provider, Red Marker’s responsibility covers the secure handling, storage, and transfer of our client’s data. Red Marker works with its clients to ensure they understand their responsibilities and ensure they set the appropriate access control models, so the right users have the right access to their data. This ensures that clients can meet their own legislative and regulatory data privacy requirements.

Independent Assurance and Certification

Red Marker is ISO 27001:2013 certified and also conducts regular independent assessment of its applications, infrastructure and information security controls.

Maintaining Information Security

Maintaining best practice security competencies is one of our information security objectives. With the increasing regulatory and operational requirements to ensure personal information is kept secure, Red Marker systems are built with a security-first mindset.

Our software development team has a grounding in secure coding principles and techniques, as well as training in the most common website vulnerabilities (OWASP) including the ways in which an attack can progress through a system to extract information.

This knowledge enables our engineers to code and develops highly secured systems on an ongoing basis. Additionally, all Red Marker employees are required to have a firm understanding of information security in line with our Information Security Policy and undertake security training.

Supply Chain Security

Red Marker maintains strong relationships with our suppliers. Our key suppliers, such as our hosting provider AWS, have been selected for the breadth and depth of their security credentials. All of our suppliers undergo proper due diligence and thorough vetting prior to engagement including a risk analysis prior to establishing a formal relationship.

Managing Uptime

As a SaaS provider, uninterrupted access to our systems is codified in our availability service level of 99.5% uptime.

We achieve this in several ways, our infrastructure incorporates both resiliency and redundancy, our software development lifecycle is strictly controlled and managed, and backup and restore procedures are tested on a regular basis.

We maintain a live application status page at


FIPS 140-2 Logo
FIPS 140-2
ISO 27001 Logo
ISO 27001
ISO 27001 SoA Logo
ISO 27001 SoA
Start your security review
View & download sensitive information
Ask for information

Red Marker is reviewed and trusted by

ISO 27001
Network Diagram
Pentest Report
Security Prospectus
ISO 27001 SoA
Product Architecture
Cyber Insurance
Master Services Agreement
Acceptable Use Policy
Access Control Policy
Anti-Malware Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Cloud Security Policy
Data Classification Policy
Data Sanitization Policy
Data Security Policy
Encryption Policy
Incident Response Policy
Information Security Policy
Information Security Risk Framework
Information Security Risk Framework
Information Security Statement
Internal and External Communications
Password Policy
Physical Security
Supplier Management Security Policy
Vulnerability Management Policy

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Recovery Time Objective4 hours
View more

Product Security

Audit Logging
Data Security
View more


Network Diagram
Pentest Report
Security Prospectus

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Responsible Disclosure
Bot Detection
Code Analysis
View more

Data Privacy

Data Into System
Data Privacy Officer
View more

Access Control

Data Access
Password Security


Amazon Web Services
View more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management
View more

Network Security

Data Loss Prevention
View more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more


Acceptable Use Policy
Access Control Policy
Anti-Malware Policy
View more

Security Grades

Security Scorecard A grade
Red Marker APAC App
Red Marker EMEA App
Red Marker US App
HSTS Preload List
View more

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo