Applyflow International Pty Ltd (“Applyflow International”) the parent company of Applyflow Technologies Pty Ltd, Applyflow Technologies (UK) Limited, and Applyflow Technologies (US) Inc (together, “the Subsidiaries”), is dedicated to upholding the confidentiality, integrity and availability of all information and data that we collect, process, store or transmit on behalf of our customers. Protecting these assets is essential to both our operational resilience and the privacy expectations of the organisations who rely on us.
As a provider of mission-critical recruitment technology, we understand the importance of transparency in demonstrating our commitment to security. Our Trust Centre provides detailed insights into the security controls, standards, procedures and shared responsibilities that shape our approach to safeguarding customer data.
This Security Posture provides an overview of the governance, risk management and technical safeguards implemented across Applyflow. It outlines the mechanisms we use to detect, mitigate and respond to threats, align with recognised industry standards, and drive continuous improvement throughout our security programme.
Commitment Statement "Applyflow continually invests in security capabilities, internal training and modern infrastructure to ensure our platform remains resilient and aligned with evolving industry standards."
Transparency & Shared Responsibility "We clearly define shared responsibilities between Applyflow and our customers to ensure secure configurations, access controls and data management."
Continuous Improvement "Our security posture is regularly reviewed and enhanced through audits, testing, third-party assessments and the adoption of new tools and practices."
Risk Management "We use a proactive, risk-based approach to identify potential threats and implement preventative, detective and responsive controls."
Founded in 2020
Here are the controls implemented at Applyflow to ensure compliance, as a part of our security program.
Production System User Review
Termination of Employment
User Privileges Reviews
User Access Reviews
Encrypting Data At Rest
Inventory of Infrastructure Assets
Data Backups
Testing for Reliability and Integrity
Impact analysis
Limit Network Connections
External System Connections
Transmission Confidentiality
Anomalous Behavior
Capacity & Performance Management
Data used in Testing
Centralized Collection of Security Event Logs
Conspicuous Link To Privacy Notice
Secure system modification
Approval of Changes
Unauthorized Activities
Malicious Code Protection (Anti-Malware)
Full Device or Container-based Encryption
Endpoint Security Validation
Session Lock
Endpoints Encryption
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Competency Screening
Personnel Screening
New Hire Policy Acknowledgement
Security & Privacy Awareness
Performance Review
Periodic Policy Acknowledgement
Automated Reporting
Incident Reporting Assistance
Risk Framing
Risk Assessment
Fraud
Third-Party Criticality Assessments
Assigned Cybersecurity & Privacy Responsibilities
Internal Audit using Sprinto
Periodic Review & Update of Cybersecurity & Privacy Program
Management Review of Org Chart
Management Review of Risks
Management Review of Third-Party Risks
Subservice organization evaluation
Segregates Roles and Responsibilities
Testing
Asset Ownership Assignment
Data Governance
New Hire Security & Privacy Training Records
Periodic Security & Privacy Training Records
Updates During Installations / Removals
Inventory of Endpoint Assets