Cybersecurity

iAutomator designs each deployment by selecting the infrastructure, vendors, and protective measures best suited to each organisation’s profile and compliance requirements. However, always with:
Data at rest encrypted with AES-256
Data in transit encrypted with TLS 1.2+
MFA authentication via password plus Google or Microsoft Authenticator
Continous security configuration reviews

We offer hosting on both Virtual Private Server (VPS) and Private Virtual Machine (VM)
With full-disk encryption (AES-256)
Security updates applied automatically
With modular architectures to avoid vendor lock-in

Alignment with GDPR and UK GDPR

We select infrastructure providers hearquartered in, or with operational presence in the EU, and with security certifications that can be independently verified