Trust Center

Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

At Red Marker, we understand that our cloud platform plays a key role in helping our customers protect one of their most important resources, their brand.

We take this responsibility seriously and use secure engineering principles to build our services, architecture, software, and systems. Security principles are designed into our software systems from the earliest development opportunity.

Importance of Information Security

The security of information is a core pillar of the products and services we deliver. We manage our privacy obligations to ensure the confidentiality, integrity and availability of information are in line with Australian and New Zealand, US and European Privacy legislation.

Dedicated Security Team and Security-centric Staff

Red Marker's experienced security team comprises Red Marker’s CTO and Information Security Manager who is a certified Information Security Manager (CISM).

As a SaaS provider, Red Marker’s responsibility covers the secure handling, storage, and transfer of our client’s data. Red Marker works with its clients to ensure they understand their responsibilities and ensure they set the appropriate access control models, so the right users have the right access to their data. This ensures that clients can meet their own legislative and regulatory data privacy requirements.

Independent Assurance and Certification

Red Marker is ISO 27001:2013 certified and also conducts regular independent assessment of its applications, infrastructure and information security controls.

Maintaining Information Security

Maintaining best practice security competencies is one of our information security objectives. With the increasing regulatory and operational requirements to ensure personal information is kept secure, Red Marker systems are built with a security-first mindset.

Our software development team has a grounding in secure coding principles and techniques, as well as training in the most common website vulnerabilities (OWASP) including the ways in which an attack can progress through a system to extract information.

This knowledge enables our engineers to code and develops highly secured systems on an ongoing basis. Additionally, all Red Marker employees are required to have a firm understanding of information security in line with our Information Security Policy and undertake security training.

Supply Chain Security

Red Marker maintains strong relationships with our suppliers. Our key suppliers, such as our hosting provider AWS, have been selected for the breadth and depth of their security credentials. All of our suppliers undergo proper due diligence and thorough vetting prior to engagement including a risk analysis prior to establishing a formal relationship.

Managing Uptime

As a SaaS provider, uninterrupted access to our systems is codified in our availability service level of 99.5% uptime.

We achieve this in several ways, our infrastructure incorporates both resiliency and redundancy, our software development lifecycle is strictly controlled and managed, and backup and restore procedures are tested on a regular basis.

We maintain a live application status page at https://status.redmarker.ai

Compliance

FIPS 140-2 Logo
FIPS 140-2
ISO 27001 Logo
ISO 27001
ISO 27001 SoA Logo
ISO 27001 SoA
Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Red Marker is reviewed and trusted by

abrdnabrdn
eToroeToro
KaplanKaplan
LGIMLGIM
x15venturesx15ventures
ISO 27001
Network Diagram
Pentest Report
Security Prospectus
ISO 27001 SoA
Cyber Insurance
Master Services Agreement
Acceptable Use Policy
Access Control Policy
Anti-Malware Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Cloud Security Policy
Data Classification Policy
Data Sanitization Policy
Data Security Policy
Encryption Policy
Incident Response Policy
Information Security Policy
Information Security Risk Framework
Information Security Risk Framework
Information Security Statement
Internal and External Communications
Password Policy
Physical Security
Supplier Management Security Policy
Vulnerability Management Policy
BC/DR
Product Architecture

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Recovery Time Objective4 hours
See more

Product Security

Audit Logging
Data Security
Integrations
See more

Reports

Network Diagram
Pentest Report
Security Prospectus

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Responsible Disclosure
Bot Detection
Code Analysis
See more

Data Privacy

Cookies
Data Into System
Data Privacy Officer
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management
See more

Network Security

Data Loss Prevention
Firewall
IDS/IPS
See more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
See more

Policies

Acceptable Use Policy
Access Control Policy
Anti-Malware Policy
See more

Security Grades

SecurityScorecard
redmarker.ai
Security Scorecard A grade
CryptCheck
Red Marker APAC App
A+
Red Marker EMEA App
A+
Red Marker US App
A+
HSTS Preload List
redmarker.ai
See more

If you think you may have discovered a vulnerability, please send us a note.

Powered BySafeBase Logo