Secure by design
We take a security by design approach across all our infrastructure, products, and operations to ensure your data is protected. Our team follows industry best practices across all areas of the business from our development and testing processes through to how we store and process your data.
Hosted on a secure environment with 24/7 monitoring and threat detection so our team can identify any vulnerabilities before they become an issue
Two Factor Authentication and flexible internal security controls enable you to stay in control of which team members have access to specific case data
We’re proud to be ISO 27001 certified and strive to continuously improve our processes and security protocols across all areas of our business globally
You’re in good company
Security in the Cloud
At Turnkey, we’ve heavily invested in the security of our platform, IPS Cloud, so you don’t have to.
We work with a network of trusted cloud providers using the latest cyber security tools to deliver and proactively monitor the security and performance of IPS Cloud.
So there’s no need to worry about infrastructure, updates, backups, or security – we take care of it all.
Interested in moving to IPS Cloud?
Our processes and products are compliant with the latest data protection and GDPR regulations
We use a robust and scalable environment which is always accessible with an average uptime of 99.9%
IPS Cloud’s named user subscriptions enable you to set permissions at a user level and see a clear trail of activity within the system
Backups of IPS Cloud are made daily so you can rest assured your data is safe in the unlikely event of a failure
Secure development and testing
Turnkey use a secure development platform and perform rigorous testing protocols to ensure all code reaches the highest quality and security standards before it is released to end users.
In addition to implementing a 24/7 managed detection and response service on our cloud platform, penetration tests are conducted annually on both IPS Cloud and the Creditor Portal by CREST certified testers to ensure they continue to meet our high security standards.
We are dedicated to the continual improvement and development of our security processes to protect both our own data, and that of our clients and are proud to demonstrate this commitment by achieving ISO 27001:2013 and Cyber Essentials certification.
Copies of our ISO 27001:2013 certifications are available to download below.