Cyber security

engage|ats utilises multiple protocols and processes to ensure that any cyber security threats are mitigated as much as possible. These processes and protocols are regularly reviewed both internally and independently using a  CREST certified Cyber Securtity agency.

Some of the security features in place

Whilst non-exhaustive, the following list gives a high-level summary of some of the methods engage|ats uses for protection against Cyber attacks:

    • DDoS Protection
    • Network threat monitoring
    • OWASP application firewall
    • TLS version 1.2
    • Encryption at rest
    • Independent Pen tests twice a year – minimum
    • Anti-virus software
    • Independent monitoring
    • Access logs
    • Failover capability

Tip: A more comprehensive list of all our processes and protocols that protect against Cyber attacks is available to all engage|ats clients.

Need some help?

We regularly respond to prospective clients requests for additional security information through a tendering process with an NDA in place.

Getting Started

Setting up engage|ats is simple and quick, we can even help you:

Transfer candidate data from your old ATS

g

Configure your process workflows to meet your needs

Z

Automate your processes

Integrate with your other HR platforms

Display jobs on your website through our API

Request a demo

Interested in a demo of engage|ats? Let us know below.
Demo Request

We’d love to keep you in the loop with product updates, new features, and more. By clicking on "Send" below, you agree to our privacy policy.

Request a demo

Contact us to schedule a demo at your convenience.

Features
Reporting
Candidate management
Candidate experience
Vacancy management
Partners & integrations
Onboarding
Online testing
Bias detection
Security vetting
Job boards
Job feeds
HR systems
API
Customer care and support
247 AI help
Training
Helpdesk
Account team
Getting setup
Offboarding
Customer portal
Surveys
Newsletters
Security & compliance
ISO27001
ISO9001
Cyber security
GDPR
Cloud
SSO
Accessibility
Monitoring
Availability
DDoS
Encryption
Why engage|ats
Request a demo
Get in touch
Case studies
This site
Privacy Policy
Cookie Policy
Accessibility Statement