Trust & Security
Data security and privacy are our core values. Our team's unique expertise in both law enforcement and cyber security
results in cutting-edge technology and industry best practices to keep your data safe and secure, providing the assurance
and confidence you need.
Solid Foundations
All our products and services share common foundations. We believe the best technologies are secure and simple.
Complexity creates risk by increasing the amount to staff training and required system maintenance.
Secure by Design
- Security Standards
- Strong Encryption
- Secure Code
Easy to Use
- Clean & Simple
- No steep learning curve
- Fully Documented
Expertise
- Law Enforcement Culture
- Law Enforcement Process
- Project Experience
Built Open
- Integrations
- APIs
- Customizable
Trusted Hosting
We give you the choice to use on-premises hosting in your data centre or cloud-hosted software as a service (SaaS).
Cloud Hosting (SaaS)
SaaS deployments are in hosted AWS and are accessed through an Internet connection, leveraging the power, flexibility and security of the world’s largest public cloud service provider to provide a secure environment for our platforms and our customers’ data,
backed by the AWS uptime SLA and secured infrastructure.

AWS Hosting
If you choose a SaaS model, we use secure AWS hosting in the country of your choice


CCCS Certified
AWS is certified by the Canadian Centre for Cyber Security (CCCS). Read the full assessment here.
Privacy Certified
AWS is certified to adhere to all Canadian privacy laws, including PIPEDA (Personal Information Protection and Electronic Documents Act). Read the full assessment here.
AWS is certified to adhere to all Canadian privacy laws, including PIPEDA (Personal Information Protection and Electronic Documents Act). Read the full assessment here.
CJIS Certified
AWS is certified by the Criminal Justice Information System (CJIS).
Read the full assessment here.
AWS is certified by the Criminal Justice Information System (CJIS).
Read the full assessment here.
On-Premises Hosting
On-premises deployments consist of a pre-build VM package you can run on the hypervisor of your choice. We support VMWare, HyperV or Docker containers. Core VM requirements (processor, RAM, etc.) are very low. All traffic and data is contained within your network. Routine system maintenance tasks such as data backups and upgrade are designed to have minimal impact in time and effort on your IT staff time.
Our Plan
Our tested project methodology is designed to get up and running quickly. Our projects typically take weeks, not months, to implement.
We discuss and document your unique needs.
We develop a full implementation plan for your review with detailed timelines and deliverables.
We build, test and prepare for deployment.
We develop a communication strategy and training for your key staff.