Skip to main content
We keep your data safe

Security Matters

The LEIAA platform is built with security in mind, deploying industry-leading technology to safeguard your mission critical data.

Security and privacy at Augmetec

We are committed to building trust in our organisation and platforms by ensuring we deploy the most advanced, secure and global Security and Privacy controls to protect our customer data

Data Security

Your LEIAA. Your environment.

Your LEIAA instance is hosted on a separate, dedicated environment, only available to and accessible by you. Our Virtual Private Cloud architecture provides for a global network spanning multiple regions, meticulously segregated to ensure data isolation and integrity.

Secure end-to-end encryption

The entire LEIAA platform is end-to-end encrypted with industry-leading data-at-rest encryption using AES256bit and transit layer encryption using TLS1.2/1.3 or higher, maintaining granular protection over resources and communication channels.

Secret management

Encryption keys and Application secrets such as API keys, passwords, certificates, and other sensitive data are encrypted and stored securely via GCP Secret Manager. Access to these values is strictly controlled.

Access limits

LEIAA's in-built Access Controls limits who can view or modify information held on LEIAA to those with a legitimate business need and on the principle of least privilege.

We employ a security-by-design approach

With each layer of defence meticulously orchestrated, our security infrastructure stands as a reliable safeguard, ensuring the protection of your digital assets in an ever-evolving threat landscape.

Command Centre Security

Threat monitoring and detection

We constantly scan for network-based threats and vulnerabilities with highly advanced Intrusion Detection Systems, while simultaneously deploying a cutting-edge enterprise grade Web-Application-Firewall (WAF) and market leading network security services to provide total protection against DDoS, cross-site scripting and SQL injection attacks.

Data backups

All of your data is regularly backed up throughout the day as part of resilient backup protocols, and stored in a secure environment for an extended period of time to ensure data integrity and continuity. In the event that any disruptions arise, we deploy comprehensive and rigirously tested disaster recovery procedures.

Continuous monitoring

We continuously monitor the LEIAA network for real-time machine health, security and uptime status by using multiple tools at our disposal, acting on any flagged events with speed.

Maintaining optimal performance

With network auto-scaling and cross-centre deployment, LEIAA grows with your needs to ensure optimal speed and stability, and is designed to remain online in the event of a data centre outage.

We prioritise security and compliance

Our application security aligns with industry leading standards and mitigates against OWASP Top 10 web application security vulnerabilities.