Biometry Solutions logo

Security by design

The stakes are higher than ever when it comes to protecting sensitive information and maintaining user trust.

Fraudsters are smart, technology enables more sophisticated attacks, and it’s up to us to always to be a step ahead.

Our commitment to maintaining the highest standards of data protection is reflected in our robust governance, encryption and data storage practices, so your biometric data always remains secure.

Securing your customers

The security and privacy of your information are always a priority. We make sure every interaction is safe and protected.

Our encryption practices are designed to keep sensitive information secure and confidential.

Confidentiality

Our use of AES-256 and TLS encryption ensures that only authorised parties can access sensitive biometric data.

Integrity

We use hashing techniques to verify data integrity, to make sure the data has not been tampered with.

Compliance

By following strict encryption and hashing standards, we ensure secure and responsible data handling, complying with regulations and best practices.

Security standards

We’re building our solutions to align with industry best practice requirements including ISO 27001.

Disrupt Emerging Threats Icon

Encryption at rest

We use Advanced Encryption Standard (AES) with a 256-bit key length (AES-256) to encrypt biometric data at rest. This industry-standard encryption method ensures that your data is protected even if the storage medium is compromised.

On Board with Confidence Icon

Encryption in transit

We use Transport Layer Security (TLS) to protect data during transmission. This ensures that biometric information is encrypted as it moves between clients and servers, preventing interception and unauthorised access.

Advanced Protection Icon

Storage of encryption keys

Encryption keys are securely managed using Google Cloud Key Management Service (KMS). This service ensures that keys are only accessible to authorised systems and personnel, providing an additional layer of security.

Want more information?

Clients receive a copy of our security policy when they join.