Skip to main content
Company Trust & Security

Trust & Security

Data security and privacy are our core values. Our team's unique expertise in both law enforcement and cyber security 

results in cutting-edge technology and industry best practices to keep your data safe and secure, providing the assurance 

and confidence you need.

Solid Foundations

All our products and services share common foundations. We believe the best technologies are secure and simple. 

Complexity creates risk by increasing the amount to staff training and required system maintenance.

Secure by Design

  • Security Standards
  • Strong Encryption
  • Secure Code

Easy to Use

  • Clean & Simple
  • No steep learning curve
  • Fully Documented

Expertise

  • Law Enforcement Culture
  • Law Enforcement Process
  • Project Experience

Built Open

  • Integrations
  • APIs
  • Customizable

Built on Standards

We take security seriously so our work and solutions are guided by the top security standards including OWASP, NIST CSF, CIS v2 and COBIT19.

Trusted Hosting
We give you the choice to use on-premises hosting in your data centre or cloud-hosted software as a service (SaaS). 

Cloud Hosting (SaaS)

SaaS deployments are in hosted AWS and are accessed through an Internet connection, leveraging the power, flexibility and security of the world’s largest public cloud service provider to provide a secure environment for our platforms and our customers’ data,

backed by the AWS uptime SLA and secured infrastructure.  

AWS Hosting

If  you choose a SaaS model, we use secure AWS hosting in the country of your choice

CCCS Certified

AWS is certified by the Canadian Centre for Cyber Security (CCCS). Read the full assessment here.

Privacy Certified

AWS is certified to adhere to all Canadian privacy laws, including PIPEDA (Personal Information Protection and Electronic Documents Act). Read the full assessment here

CJIS Certified

AWS is certified by the Criminal Justice Information System (CJIS). 

Read the full assessment here

On-Premises Hosting

On-premises deployments consist of a pre-build VM package you can run on the hypervisor of your choice. We support VMWare, HyperV or Docker containers. Core VM requirements (processor, RAM, etc.) are very low. All traffic and data is contained within your network. Routine system maintenance tasks such as data backups and upgrade are designed to have minimal impact in time and effort on your IT staff time.

Our Plan

Our tested project methodology is designed to get up and running quickly. Our projects typically take weeks, not months, to implement.


    1. Discovery
    2. Planning
    3. Implementation
    4. Go Live & Training
    1. Discovery

    We discuss and document your unique needs.

    2. Planning

    We develop a full implementation plan for your review with detailed timelines and deliverables.

    3. Implementation

    We build, test and prepare for deployment.

    4. Go Live & Training

    We develop a communication strategy and training for your key staff.