Security Processes

We acknowledge that there is always margin for error. We are proactive in detecting security issues, which allows us to address identified gaps as soon as possible to minimize the damage.

Security Incident Management

Our routines, speed and efficiency aim to keep any incident impact as low as possible, in the unlikely event of a security incident.

The security team at Verified aggregates logs from various sources in the hosting infrastructure. Our internal processes define how these alerts are triaged, investigated further, and escalated appropriately. Our customers and the wider community are encouraged to report suspected security incidents through Verified Support.

In the event of a serious security incident, Verified has access to the expertise internally - and through external subject matter experts - to investigate incidents and mitigate them until closure. The database of our security incidents is cataloged against the ITIL Framework.

Security Incident Management

Our routines, speed and efficiency aim to keep any incident impact as low as possible, in the unlikely event of a security incident.

The security team at Verified aggregates logs from various sources in the hosting infrastructure. Our internal processes define how these alerts are triaged, investigated further, and escalated appropriately. Our customers and the wider community are encouraged to report suspected security incidents through Verified Support.

In the event of a serious security incident, Verified has access to the expertise internally - and through external subject matter experts - to investigate incidents and mitigate them until closure. The database of our security incidents is cataloged against the ITIL Framework.

Vulnerability Management

We have an extensive vulnerability management program to ensure that we are actively seeking out weaknesses that may be present in our environment.

Apart from our product-specific vulnerability management practices, our security team performs on-going network vulnerability scans of both our internal and external infrastructure using an industry leading vulnerability scanner.

We also use specialist security consulting firms to complete penetration tests on high-risk products and infrastructures. Internal processes are in place to review any reported vulnerabilities and act on them.

Vulnerability Management

We have an extensive vulnerability management program to ensure that we are actively seeking out weaknesses that may be present in our environment.

Apart from our product-specific vulnerability management practices, our security team performs on-going network vulnerability scans of both our internal and external infrastructure using an industry leading vulnerability scanner.

We also use specialist security consulting firms to complete penetration tests on high-risk products and infrastructures. Internal processes are in place to review any reported vulnerabilities and act on them.