Security
Our commitment to security
We prioritise security above all, using industry-leading security measures to ensure that your information is safe, secure, and accessible at all times. Discover how we combine advanced tools, rigorous processes, and a culture of vigilance to safeguard your data and operations.
.png?width=561&height=440&name=Rectangle%201%2010%20(8).png)
Dedicated security team
At Maxxton, our dedicated team of security professionals is committed to safeguarding and improving the security of our systems, products and data. The team focuses on:
- Infrastructure Security
- Data Security
- Corporate Information Security
- Governance, Risk and Compliance (GRC)
- Continuous Security Awareness Training and testing for all employees
This comprehensive approach ensures that security is integrated at every level of our operations.

Monitoring and incident readiness
- 24/7 monitoring: Our systems are continuously monitored for suspicious activities and potential threats.
- Incident response plan: We have a detailed incident response plan to quickly address and resolve security issues, minimising the impact on our customers.
- Disaster recovery: Our disaster recovery plans are crafted to reduce disruption in worst-case scenarios, with regular backup validations ensuring data integrity and rapid recovery.

Infrastructure Security
- Google Cloud hosting: Maxxton software operates on Google Cloud, utilising the same advanced security infrastructure and real-time security patches trusted by Google to protect its own system.
- Scalable, self-healing systems: Our infrastructure dynamically scales to meet demand while continuously monitoring the systems' health, guaranteeing seamless performance.
- Fortified protection against threats: Leveraging Google’s Load Balancer and Cloud Armor, we ensure resilience against DDoS attacks. At the same time, the Web Application Firewall (WAF) with pre-configured OWASP rules actively blocks malicious traffic. Continuous intrusion detection monitoring for suspicious activity, with critical alerts escalated to senior engineers around the clock for rapid response.

Data security and certifications
- Secure images: We provide robust code security through rigorous manual and automated code reviews to identify vulnerabilities. Additionally, only authorised images undergo vulnerability scans before deployment, providing a secure pipeline.
- Access Controls: Identity and Access Management (IAM) ensures the Least Privileged Principle is maintained across environments.
- Change Monitoring: Critical changes, such as IAM and firewall configurations, trigger immediate alerts, maintaining accountability.
- Certifications: PCI DSS, ISAE-3402, and NF525 certified, with annual audits upholding compliance.
- Penetration Testing: Regular external tests conducted by KPMG, Xebia, and Onvio validate our defences.
- Secure APIs: Our APIs are developed with security as a foundational principle, incorporating robust authentication and authorisation mechanisms.

Human-centric security
- Rigorous training: To cultivate a strong security culture, employees undergo over 700 hours of annual security training and are required to adhere to security policies during onboarding.
- Continuous testing: In 2024, we conducted over 2,500 phishing simulations, with our risk rate being 23.4 percentage points below the industry average.
- Dedicated security team: Our proactive security team promotes company-wide collaboration through open forums, so security is a shared responsibility at all organisational levels.
