Security

Gladius follows state-of-the-art security principles to keep your data secure

We use Vanta for continuous pro-active monitoring of our security and compliance posture.

Data Security

Gladius encrypts data at rest and in transit for all of our customers. We adhere to strict ISO and SOC 2 standards to ensure security of your data that rests with Gladius.

Application Security

Gladius regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment. Gladius also uses high-quality security tools throughout the development process.

Infrastructure Security

Gladius uses Render & Supabase to host our application and make full use of the security products embedded within the Render ecosystem. In addition, we deploy our application using containers run on Render-managed services, meaning we do not manage servers in production.

Gladius' promise to you

At Gladius, we take data integrity and security very seriously. Due to the nature of the product and service we provide, it is important that we acknowledge our responsibilities both as data controller as well as a data processor. We store and process your data and that of your customers with care and help you be compliant so that you can continue to build trust while enhancing customer experiences.

Our infrastructure, processes and systems are reliable, robust and are being third-party tested. We continuously look for opportunities to make improvements and give you a highly secure, and scalable market intelligence platform.

Gladius' GDPR Commitment

Gladius only collects and stores information that is necessary to offer our service, and we do this only with the consent of our customers. Our approach towards privacy, security, and data protection align with the core tenets of GDPR.

Gladius takes Data Protection seriously - we have completed a comprehensive review of our operations to ensure that we are able to meet our obligations under all applicable regulations in all territories. We have completed a GDPR implementation project to ensure we have all required policies and procedures in place, and that we respect the rights of our data subjects at all times.

We have documented policies and procedures covering all aspects of compliance including: Privacy Policy, SAR Policy, Data Breach Policy, Information Security Policy and have adopted the GDPR DPA document as standard.

Additionally, we have appointed an Article 27 Representative and have established relationships with data protection consultants to ensure we meet our ongoing obligations and operate to the highest level of compliance at all times.