Skip to main content

ITRS recognized in the 2025 Gartner® Magic Quadrant™ for Observability Platforms

["Company"]"0""0"

Security Center

At ITRS Group, security is not just a feature — it’s a foundational principle embedded in everything we do.

We are committed to protecting our customers’ data and maintaining the confidentiality, integrity, and availability of our systems through a proactive, risk-based approach to security.

Our security program is aligned with internationally recognized standards such as ISO/IEC 27001 and is designed to continuously evolve in response to emerging threats. We implement rigorous access controls, real-time monitoring, regular third-party audits, and a secure-by-design product development lifecycle.

Whether you’re using our platform or entrusting us with sensitive data, you can be confident that we prioritize your security at every level — technology, process, and people.

 

View ISO certificate

 

Iso 27001 badge
Security Center SOC

SOC

ITRS Group's Security Operations Center (SOC) is a centralized unit within the organization which monitors, analyses, and responds to security threats.

We have a dedicated team that works to protect the organization's assets by identifying, investigating, and mitigating cyberattacks and security incidents.

Security Policies & Governance

A comprehensive suite of security policies and procedures exists to ensure our high level of standards is communicated and applied consistently. 

Our dedicated Enterprise Security, Risk, and Compliance team evaluates applicable regulatory and contractual requirements to ensure compliance is ingrained at all levels of our organization.

Security Center Data Encryption

Data Encryption

We protect your data with industry-leading encryption, in transit and at rest.

All sensitive information is secured using strong cryptographic protocols such as TLS 1.2+ for data in transit and AES-256 for data at rest, ensuring your information is kept confidential and fully tamper-proof at all times.

Server room

Servers & Endpoints

All ITRS Group’s servers and endpoint devices are fully protected by our enterprise-grade anti-virus, malware protection, detection, and response systems.

These tools are configured to provide real-time threat prevention and automated response capabilities, ensuring swift action against known and emerging threats.

We perform regular vulnerability scans and health checks across all assets, with results reviewed by our security team and escalated according to severity.

Our endpoint protection policies are aligned with ISO 27001:2022 standards and are continuously reviewed, tested, and updated to reflect the evolving threat landscape and business requirements.

By combining automated controls, regular audits, and security policy governance, we maintain a secure environment for both internal operations and customer data.

Security Center Network Security

Network Security

Our network is protected by best-in-class firewall and router technology, TLS encryption, and a network intrusion detection system that monitors and proactively blocks malicious traffic and other undesirables.

 

Security Center Employee lifecycle

Employee Lifecycle

ITRS Group's onboarding process involves comprehensive interviewing of candidates, background screening, and a structured onboarding period.

Exiting employees' access to all systems is terminated within one business day.

Security Center Data Classification

Data Classification

ITRS Group actively categorise all data based on sensitivity and criticality to determine appropriate security measures and access controls. This process adds protection to sensitive information, complies with regulations like the GDPR.

Pen testing

Penetration Testing

To stay ahead of emerging threats, we conduct regular internal and external penetration tests across our environments.

These assessments are performed by independent security experts and internal teams using industry-recognized methodologies such as OWASP and NIST.

Findings are carefully reviewed, prioritized, and addressed as part of our continuous improvement process.

This proactive approach ensures our systems remain resilient against evolving cyber threats and demonstrates our commitment to maintaining a secure SaaS platform.

Need to report a concern?

If you've noticed any abuse, misuse, exploitation, or experienced an incident with your account data or security, open a support ticket and we’ll be ready to help.

Discover the true impact of ITRS

Experience the monitoring platform for integrated workflows, offering full end-to-end control over applications, servers, websites, APIs, networks, and logs.