FLEXIBLE AND SECURE TECHNOLOGY
We operate secure technology driven by opensource software
CUSTOMISED DASHBOARDS
Tracking and Audit Dashboards empower our clients at the global level while delivering relevant local solutions.
Accreditations and Certifications
AuditStar operates at the highest level of quality and security to deliver exceptional solutions to our clients.
Our services, systems and procedures are certified by internationally recognised standards for Quality Management and Information Security.
Quality Managed Systems
AuditStar has gained accreditation to BS EN ISO 9001:2015.
ISO 9001 is the internationally recognised standard for the quality management of businesses.
ISO 9001:
- Applies to the processes that create and control the services we supply.
- Prescribes systematic control of activities to ensure that the needs and expectations of clients are met.
- Is designed and intended to apply to all the services we provide.
INFORMATION SECURE SYSTEMS
AuditStar has gained accreditation to BS EN ISO/IEC 27001:2017.
ISO 27001 is the internationally recognised standard for the management of information security.
ISO 27001:
- Is recognised worldwide as an indication that our information security management system is aligned with information security best practice.
- Prescribes systematic control of activities to ensure that the confidentiality, integrity, and availability of corporate information assets are secure.
- Is designed and intended to apply to everything we do.
CYBER SECURE SYSTEMS
AuditStar has gained Cyber Essentials and Cyber Essentials Plus certifications
These certifications involve an independent assessment of our security system to verify that the required technical security controls have been successfully implemented. Cyber Essentials is an industry supported scheme developed by the UK Government.
Cyber Essentials and Cyber Essentials Plus:
- Require us to implement a broad range of technical and procedural controls in order to mitigate common, internet-borne cyber-attacks such as hacking, phishing and password guessing.
- Form one part of our wider risk management strategy to protect the confidentiality, integrity and availability of data stored on devices which connect to the Internet.
- Reaffirm our commitment to enforcing the highest standards of data security in all that we do.