Security at Quiq

A top down commitment to security is one of our core values.

Safeguarding your data is our highest priority.

Product Security

SOC 2 TYPE II

Quiq has undertaken the AICPA SOC 2 Type II certification to attest to Security, Confidentiality, and Availability controls in place in accordance to the AICPA Trust Service Criteria.

Encryption

All data in Quiq Messaging is strongly encrypted, both during transmission and at rest.

Data Center Security

Quiq uses Amazon Web Services. AWS is the industry standard for cloud computing infrastructure, featuring ISO, SOC and CSA compliance programs.

Security Testing

Vulnerability scans are regularly performed to ensure the Quiq system is not open to hackers. We use third-party Pen testing in addition to manual and automated internal vulnerability scans.

Fault Tolerant

Quiq is built using a microservices architecture with multiple nodes for every service so that there are no single points of failure. Quiq is fully redundant across all of our data centers.

Disaster Recovery

Quiq tests and maintains Disaster Recovery and Business Continuity plans to help ensure a high level of continuous service, even in the face of a geographical disaster. Backups are continuously mirrored to other AWS data centers in geographic locations.

Defense-in-depth

A good security strategy should never rely on just one thing, which is why Quiq uses redundant layers of protection throughout our stack.

Data Stewardship

Your data in Quiq belongs to you. Quiq will never use your confidential information for any other purpose than to serve your business.

People Security

Security starts with people. All employees are background checked and covered by a confidentiality agreement. Access to data is restricted to only those employees who strictly need access to perform their job function. Policies and procedures exist for the handling of confidential data and employees must pass security training.

White paper

Security is key to everything we do. The Quiq team has extensive experience building applications that meet the security, reliability and scalability of the most demanding enterprises. Our security white paper is available by request.