Trust CENTRE

A partner you can trust.

Leading organisations trust SecureCo to help them deliver a better customer experience through human interactions. SecureCo provides a variety of services, tools, and resources to help you manage your corporate telephony and voice ecosystems. And here’s why you can depend on us.

Trust begins with transparency

When it comes to trust, there is no finish line and we wok directly with our partners, and customers to ensure their success. That’s why we provide information on our systems status, security and compliance policies.

Compliance

Learn how SecureCo meets industry best practices and standards to achieve compliance.

Privacy

Our commitment to safeguarding your privacy against misuse, abuse or compromise.

Security

Learn how we secure the Intelligent Voice Platform and your data.

Compliance & Certifications

SecureCo meets industry best practices and standards to achieve compliance with industry-accepted general security and privacy frameworks, inspiring confidence and trust and helping our partners and customers meet their compliance standards.

ISO27001 Certified logo
PCI DSS Compliant Logo

How we secure our platform?

Our Intelligent Voice Platform is operated and hosted in IBM Cloud, utilising their world-class security features and benefits. SecureCo has established a Product Security Framework that ensures our products protect your people and data.

Secure Cloud

We host our services and data in IBM Cloud, leveraging IBM’s world-class data centres and their security benefits, certifications, across AU, US and EU locations.

Secure Practices

We utilise IBM’s well-architected framework to ensure the best possible security practices are implemented and followed.

Incident Response

We have a mature SIEM program utilising industry-leading monitoring and threat detection systems.

Encryption

TLS 1.2 (or higher) is enforced for all communications to and from any endpoint, such as APIs or web servers. We leverage industry-standard AES-256 encryption for data at rest.

Penetration Testing

Penetration Testing is undertaken regularly by our PCI Assessor as part of our PCI DSS compliance. We also conduct internal testing and scanning programs.

Threat Scanning

3rd party companies continuously scan 24x7 for security threats and deliver alerts and reports on aversion actions taken.

Security Training

Our software and voice engineers are trained to understand and prevent the most common and severe vulnerabilities impacting software.

Checklist Icon

Compliance

We undergo independent third-party audits and certify our services against both PCI DSS and ISO 27001.

Report a security vulnerability

Found a vulnerability? Let our security team know, so we can get straight to work.

Looking for something more specific?

Additional privacy and security documents are available upon request, but may require a mutual non-disclosure agreement to be completed. Please complete the form below and we'll be in contact with you to explore your request.

Get the latest customer experience technology insights

Join the SecureCo CX community and get the latest low-down on customer experience and how you can unlock the power of speech technology for your customers.

By clicking Sign Up you're confirming that you agree with our Privacy Policy
Thank you! For joining the SecureCo CX community
Oops! Something went wrong while submitting your request.