Request a demo

A multi-layered approach to security

We are living in an increasingly security conscious world, and are faced with an increasing range of cyber threats. Agylia protects your IP and your users’ personal information, through a multi-layered approach to security, one that considers people, process and technology.

  • ISO 27001 Certified and Cyber Essentials Certified
  • World leading data centre hosting facilities
  • Secure software development lifecycle, independent CREST accredited penetration testing
  • Security support to address your own specific regulatory and compliance requirements
A multi-layered approach to security
  • Single sign-on

    Single sign-on (SSO) enables users to automatically log in to Agylia when signed in to other systems and applications – such as a user’s work device (PC or laptop), corporate intranet sites or HR systems.

    With SSO, users don’t need to remember additional passwords or continuously enter login credentials to access their learning and support materials.   

    Single sign-on
  • Secure hosting facilities

    Agylia is a distributed, service-oriented system that utilises cloud technology. We use a combination of Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) technology and solutions provided by a number of world-leading partners including Microsoft, Amazon, Rackspace and IBM.

    Physical data centre security provided by our partners includes key cards, biometric scanning protocols, 24x7 interior and exterior surveillance to monitor data centre access. Numerous environmental controls help mitigate against the risk of interruption caused by fire, floods and other forms of natural disasters.

    Additionally, our partners operate numerous information management frameworks based on a range of IT security standards including ISO 27001, with policies reviewed at least annually. SOC1 and 2 audit reports supplied by our hosting partners can be provided on request.

    Read more
    Secure hosting facilities
  • Security throughout the lifecycle

    We incorporate security engineering best practices throughout our software development lifecycle to help ensure a robust and secure solution.

    Security objectives, goals and constraints are considered and defined early, prior to any new feature development. We use proven architecture and design practices, patterns and principles to avoid common vulnerabilities introduced by poor design choices.

    Threat modeling helps us to understand and identify the threats and vulnerabilities relevant to specific application scenarios.

    Security code reviews are a continuous activity performed by our software development team throughout the lifecycle. The aim is to identify security vulnerabilities before they make it into released code.

    Finally, deployment reviews help to ensure that any inadvertently weak or inappropriate configuration settings do not introduce security vulnerabilities.

     

    Read more
    Security throughout the lifecycle
  • Penetration testing

    Penetration testing is a regular part of our security operations. Agylia is subject to regular penetration testing by independent, CREST accredited security specialists. We are happy to share our latest penetration test reports on request. Please contact info@agylia.com for more information.

    We are also able to support your own penetration testing, by your own IS departments and security teams, should this be one of your requirements.

    Penetration testing

Downloads

For our full collection, please see our whitepapers and datasheets sections.

Some of our clients:
  • Microsoft
  • FCO
  • Deloitte
  • E.ON
  • PWC
  • Telefonica
  • NHS Digital
  • RBS
  • Virgin Trains
  • Blippar
  • Jhpiego