Trust Vigilant with your security and privacy

Vigilant employs the highest security measures to meet data protection and compliance needs.

Contact Us

Trust Centre

Vigilant is committed to the security and privacy of your data

At Vigilant, we have built our business on the highest levels of ethical standards and commitment to compliance with legal and regulatory frameworks, emphasising vigorous information security management.

Our mission is to safeguard the trust our valued customers place in us, by upholding transparency in policies and implementing robust measures to exceed privacy expectations.

Security Measures

Safeguarding your data is our top priority. We employ a robust set of security measures to ensure the utmost protection of your information. Our security practices include:

Security measures

Encryption Protocols

All data transmitted between your device and our servers is secured using the latest recommended industry-standard encryption protocols. This ensures that your information remains confidential and protected during transit.

Access Controls

We implement stringent access controls to regulate and monitor who can access your data. Where possible, we integrate with our customer’s single sign-on (SSO) solutions. Multi-factor authentication adds an extra layer of security, ensuring that only authorised personnel can access sensitive information.

Data Integrity

Measures are in place to maintain the integrity of your data. We employ checksums, hashing and other techniques to detect and prevent unauthorised alterations. Where passwords are stored, we use appropriate password specific hashing algorithms such as Argon2 and separate access between microservices using the CQRS pattern to prevent injection attacks.

Regular Security Audits

Our systems undergo regular security audits, conducted by independent experts to identify and address potential vulnerabilities. Our proactive and ISO accredited management of Information Security allows us to stay ahead of emerging threats and evolving global legislation.

Business Continuity Planning

In the unlikely event of a security incident, we have a well-defined Business Continuity Plan. This includes prompt notification to affected customers, along with a transparent and efficient resolution process resolving the issue and returning to business as usual as soon as possible.

Read ISMS Statement

Compliance and Assurance

We prioritise the security and integrity of our operations, products and services which is demonstrated through the accreditations we hold. Our accreditations include:

Compliance and Assurance

ISO 27001 Certified

Vigilant Applications are ISO/IEC 27001:2013 certified

We have achieved the ISO 27001:2013 certification, demonstrating our commitment to information security and risk management in our day-to-day operations to protect both Vigilant and its customers’ data.

Compliance with the standard outlines our effective risk management systems and application of information security controls such as regular supplier screening and system tests for potential weaknesses. We have been recognised and commended for the effective practices that strengthen our data security. These include auditing all existing systems regularly, including information assets, logging all risks companywide and regulated, consistent training for all staff in information security.

ISO 27001 has recognised our exceptional commitment to information management and security, reassuring our clients that we are competent to handle their highly sensitive information whilst minimising the risk of a data breach.

Download Certificate
ISO Certified

Cyber Essentials

Cyber Essentials is an effective, UK government backed scheme designed to help organisations of all sizes against the most common cyber threats. Our certification demonstrates our competence and compliance with these measures in areas such as network security, access control, malware protection and the latest anti-virus software.

Download Certificate
Cyber Essentials

Cyber Essentials Plus

Vigilant is also Cyber Essentials Plus certified, this means we have had an external assessor perform a technical audit of our systems and a representative set of devices to ensure that maintenance and the office network are secure.

Download Certificate
Cyber Essentials Plus

Data Management

We are dedicated to maintaining the highest standards of data management, ensuring that your data is handled with the utmost care and security through our practices and those of third parties we work with.

Data Management

Thorough DPIAs on Third Parties

In adherence to our ISO 27001 certification, we conduct thorough Data Protection Impact Assessments (DPIAs) on third-party services involved in processing data for our clients and ourselves. This diligent evaluation ensures that these partners meet our stringent privacy and security criteria. The DPIAs assess the potential risks and impacts of data processing activities, allowing us to implement measures that safeguard your data and uphold the highest standards of information security.

Supplier Onboarding and Standards Adherence

We recognise the critical role our suppliers play in maintaining the integrity of your data. Therefore, we have implemented a robust supplier onboarding process. This involves a comprehensive evaluation of their data protection practices, security measures, and compliance with relevant regulations. By partnering with reputable suppliers and conducting stringent onboarding procedures, we aim to guarantee that your data is handled with the same level of care and security as our own.

Explore More

Contact us

Fostering trust and confidence

Your trust is of utmost importance to us, and we are committed to maintaining the highest standards of data protection throughout our ecosystem.

If you have any specific questions regarding our third-party relationships or standards adherence, please contact

Contact Us