Skip to content

 

A security-first mindset that's rooted in our core value of the trust 

Our core value of trust is rooted in a security-first mindset, ensuring that our customers can rely on us to provide the highest level of protection for their sensitive data and systems.

A security-first mindset that's rooted in our core value of trust
Trust is Our Ethos

 

Trust is Our Ethos

OutTask was founded to help build trust across the internet by allowing companies to stand up and maintain their security posture. Security and compliance are at the core of what we provide, and they're also at the core of what we do. Out Task works with independent experts to verify our own security, privacy, and compliance controls and has achieved ISO 27001 certification.

Data Security, Privacy and Compliance

Companies need to keep their data safe. If someone gets into the company's data, they can steal it. If they steal it, then the company can get in trouble. If the company gets in trouble, then the company might go out of business.

Being in the security and compliance automation business means holding our own internal programs to the highest standards. The team at Out Task is committed to achieving and maintaining the trust of our customers, partners, and employees. If you have any compliance or privacy questions, please get in touch.

Data Security, Privacy and Compliance

Stringent Security Controls

3rd Party Pen Testing

3rd Party Pen Testing

Our Task completes annual third-party penetration tests performed by a qualified assessor, as well as major changes to our infrastructure and processes. 

Monthly Security Training

Monthly Security Training

We've partnered with a leading security training company to cover 13 major topics for our employee training.

Phishing Testing

Phishing Testing

Every month, we simulate phishing exercises with all staff using extremely realistic phishing emails. 

Security by Design

Security by Design

When connecting to customers' environments, we use the least privilege possible, scoping out only what is required to satisfy the control. 

Infrastructure

AWS

AWS

AWS handles physical and virtual aspects as part of the shared responsibility model. Deployments with AWS reduce our footprint and improve our security posture.

Spoofing Protection

Spoofing Protection

Network spoofing protection is enabled by our cloud provider, which prevents adversaries from spoofing traffic or arp addresses.

Google Workspace

Google Workspace

Google workspaces pass audits and comply with the highest security standards in the sector. Its security features allow us to create flexible and scalable workspaces.

Anomaly Detection

Anomaly Detection

For anomaly detection, Out Task employs a variety of services, including Guard Duty and third-party security services from reputable vendors. 

Endpoint

Mobile Device Management

Mobile Device Management

All of our devices are centrally managed with policies around security, patching, and encryption enforced.

Endpoint Detection Response

Endpoint Detection Response

Out Task uses the latest technology in endpoint security to identify potential threats. We go beyond anti-virus and use EDR to see malicious activation and the chain of events that lead up to it.

Advanced Persistent Threat Detection

Advanced Persistent Threat Detection

There are many threat actors that target specific companies, Out Task combats this by using a solution that has ATP protection and 24/7 managed threat hunting capabilities.

DNS Filtering

DNS Filtering

We have implemented advanced DNS filtering on our endpoints to filter malicious requests that could harm our employees and infrastructure.