Security Center
At ITRS Group, security is not just a feature — it’s a foundational principle embedded in everything we do.
ITRS recognized in the 2025 Gartner® Magic Quadrant™ for Observability Platforms
At ITRS Group, security is not just a feature — it’s a foundational principle embedded in everything we do.
We are committed to protecting our customers’ data and maintaining the confidentiality, integrity, and availability of our systems through a proactive, risk-based approach to security.
Our security program is aligned with internationally recognized standards such as ISO/IEC 27001 and is designed to continuously evolve in response to emerging threats. We implement rigorous access controls, real-time monitoring, regular third-party audits, and a secure-by-design product development lifecycle.
Whether you’re using our platform or entrusting us with sensitive data, you can be confident that we prioritize your security at every level — technology, process, and people.
ITRS Group's Security Operations Center (SOC) is a centralized unit within the organization which monitors, analyses, and responds to security threats.
We have a dedicated team that works to protect the organization's assets by identifying, investigating, and mitigating cyberattacks and security incidents.
A comprehensive suite of security policies and procedures exists to ensure our high level of standards is communicated and applied consistently.
Our dedicated Enterprise Security, Risk, and Compliance team evaluates applicable regulatory and contractual requirements to ensure compliance is ingrained at all levels of our organization.
We protect your data with industry-leading encryption, in transit and at rest.
All sensitive information is secured using strong cryptographic protocols such as TLS 1.2+ for data in transit and AES-256 for data at rest, ensuring your information is kept confidential and fully tamper-proof at all times.
All ITRS Group’s servers and endpoint devices are fully protected by our enterprise-grade anti-virus, malware protection, detection, and response systems.
These tools are configured to provide real-time threat prevention and automated response capabilities, ensuring swift action against known and emerging threats.
We perform regular vulnerability scans and health checks across all assets, with results reviewed by our security team and escalated according to severity.
Our endpoint protection policies are aligned with ISO 27001:2022 standards and are continuously reviewed, tested, and updated to reflect the evolving threat landscape and business requirements.
By combining automated controls, regular audits, and security policy governance, we maintain a secure environment for both internal operations and customer data.
Our network is protected by best-in-class firewall and router technology, TLS encryption, and a network intrusion detection system that monitors and proactively blocks malicious traffic and other undesirables.
ITRS Group's onboarding process involves comprehensive interviewing of candidates, background screening, and a structured onboarding period.
Exiting employees' access to all systems is terminated within one business day.
ITRS Group actively categorise all data based on sensitivity and criticality to determine appropriate security measures and access controls. This process adds protection to sensitive information, complies with regulations like the GDPR.
To stay ahead of emerging threats, we conduct regular internal and external penetration tests across our environments.
These assessments are performed by independent security experts and internal teams using industry-recognized methodologies such as OWASP and NIST.
Findings are carefully reviewed, prioritized, and addressed as part of our continuous improvement process.
This proactive approach ensures our systems remain resilient against evolving cyber threats and demonstrates our commitment to maintaining a secure SaaS platform.
If you've noticed any abuse, misuse, exploitation, or experienced an incident with your account data or security, open a support ticket and we’ll be ready to help.
Digitization has transformed our world. Every organization wanting to deliver the services that customers and employees demand must protect its network. Any software you use to run your business needs to have a sufficient layer of security.
DevOps brings many benefits to monitoring, from improved visibility to alert “noise” reduction, but there are some barriers that need to be addressed.
As systems get more complex and dependency on IT grows, cyber threats proliferate. Therefore, designing systems with a zero trust approach - built in from the start - must become a fundamental step in the security process.
Tick tock. The clock is ticking for compliance to the European Union’s Digital Operational Resilience Act (DORA), which will go into full effect by the end of this year.
Experience the monitoring platform for integrated workflows, offering full end-to-end control over applications, servers, websites, APIs, networks, and logs.