Skip to main content
Avature

The Avature Privacy Difference

For over 15 years, Avature has provided data processing services designed to advance the fundamental privacy principles of notice, choice, access, use and disclosure.

Our SaaS platform empowers customers to configure privacy settings tailored to their unique compliance requirements, enabling adherence to specific regulatory obligations in their operational jurisdictions. Coupled with our mature organizational controls, advanced technical safeguards, and robust data localization capabilities, Avature offers one of the most comprehensive privacy-compliant data processing solutions available today.

Avature provides regional hosting options to support compliance with data localization laws. To learn more about our data location capabilities, click here

As a dedicated data processor, we maintain full compliance with all major international privacy regulations, treaties and conventions. Avature is proud to have obtained EU data protection authorities’ approval for global Binding Corporate Rules for Processors (BCRs).

Our robust zero-trust information security program is designed to prevent unauthorized access to customer data. Additionally, our technical architecture ensures the continuous availability and integrity of customer data, providing peace of mind for your operations.

To learn more about Avature’s approach to privacy, click here

Certifications & Audits

Our operations, policies and controls undergo regular audits to ensure that Avature meets and exceeds all requirements expected of a world-class technology service provider. Our commitment to maintaining our ISO, SOC 1 and SOC 2 certifications supports Avature's standard of excellence.

Registrations, Self-Assessment & Standards

Industry Leaders Trust in Avature

9
of the world's 15
largest banks
5
of the 10 largest
tech companies
28
of the Forbes
Global 100

Avature Security

At Avature, we implement a security-in-depth approach across our entire organization, combining advanced technical measures with robust organizational controls. While you retain full control over your data, we ensure that all processing is carried out using state-of-the-art security practices.

Physical Security

Our data centers are high-security facilities monitored by security personnel 24/7. They have perimeter fencing, video surveillance and controlled access to multiple security zones. Every data center has ISO or SOC certifications attesting to their controls.

Network Security

Avature’s networks are safeguarded through a combination of robust policies, procedures, and industry-leading technical standards. We employ layered perimeter defenses paired with advanced threat detection to secure every endpoint within the Avature cloud.

Our gateways are protected by sophisticated application firewalls, specifically designed to mitigate denial-of-service attacks. To maintain a secure perimeter, we conduct automated weekly vulnerability scans and promptly address any findings. Additionally, we commission biannual penetration tests performed by a PCI-certified third party to ensure comprehensive security assessments.

To protect your data, we encrypt all information in transit using strong, industry-standard encryption protocols, ensuring its confidentiality and integrity.

Application Security

At Avature, application security is foundational to our platform, combining cutting-edge technologies and rigorous practices to protect your data and ensure reliable performance.

Authentication

Avature supports both single sign-on (SAML) and multi-factor authentication (MFA). The platform also supports IP whitelisting and the use of hardware-based certificates. Privileged users can set password length, complexity and expiration, as well as inactive-user session timeout and lockout rules. All login attempts are logged, and privileged users can terminate any session in real time.

Role-Based Access Control

Customers can segment users by specific roles and permissions and access to data can be limited using groups and sharing features.

Encryption

Full-disk and field-specific encryption for sensitive data ensure robust protection, delivering a secure and reliable application security experience for our customers.

Journaling

Avature’s in-application journal logs all user activities, including login history, login attempts, changes in record data, workflow configuration and security settings.

Built-in Security Testing

Each Avature release is subjected to over 10,000 tests, including against the top 10 OWASP threats, alongside a complete set of performance benchmark tests.

Periodic Third-Party Testing

A Payment Card Industry (PCI) certified third-party security company performs a biannual penetration test for our application, mobile app and network, and the results are made available to customers.

Customer Testing

At Avature, customers can conduct their own application vulnerability tests on a copy of their configured instance in a quarantined environment. The data in this instance can be obfuscated so that customers can use third parties to perform the testing.

More Related Content

E-books & Guides

Being OFCCP Compliant with Avature

Avature helps customers efficiently meet the requirements of the U.S. Department of Labor and its Office of Federal Contract Compliance Programs (OFCCP).

View
E-books & Guides

Achieving GDPR Compliance with Avature

Read our GDPR training for recruiters guide to learn how Avature’s technical features, support, and security measures help our customers maintain and protect their candidates’ data.

View
Articles

6 Reasons to Invest in a Single Recruitment Platform

We explore the benefits of adopting a one-platform approach to talent acquisition by investing in a best-in-class recruiting suite.

View