Security & Compliance
Our Commitment to Security
Data security and privacy are integral to the way we design and build our products and processes at HubStar. We’ve got you covered with key industry best practices and regulatory standards that ensure data integrity and a great user experience.


Safe, secure and protected
HubStar is Built on Security

ISO certified
Certified with ISO 9001 and ISO 27001

GDPR compliant
Privacy protection GDPR compliant

Accessibility compliant
WCAG 2.2 AA accessibility compliance

SOC 2 compliant
Ensuring your data is secure, private, and always protected.
Trusted by leading organizations
Security our Customers Trust
HubStar uses enterprise-grade security and rigorous audits to secure your data and process.
We undergo regular penetration testing and security reviews designed to meet SOC 2 and ISO 27001 compliance, keeping your protection our top priority.
This commitment to security is ingrained in our company culture.

Protected and compliant
Application Security
Our platform is built with rigorous safeguards and independent oversight to keep your organization’s data protected and compliant at every level
Data encryption
Data is encrypted in transit with TLS 1.2. Data is encrypted at rest with AES 256

Independent testing
Independent third-party penetration, stress, and vulnerability testing.

GDPR compliance
HubStar is in full compliance with GDPR and has support for data deletion.

Access control
User access controls with single sign-on.

Cloud protection
HubStar's cloud environment is protected by AWS and Microsoft Azure security measures.

Account access
Role-based account access workflows.

Proactive security measures
Continuous security commitment
HubStar maintains a culture of security through ongoing testing, training, audits, and monitoring, ensuring risks are addressed before they become threats
Penetration testing
We perform independent penetration tests at least annually to assess the security of our systems.

Security awareness training
Employees receive regular training on information security topics like phishing and password management.

Third-party audits
We undergo regular independent audits to ensure our security practices remain robust.

Roles and responsibilities
Roles and responsibilities related to security are clearly defined and documented.

Information security program
We have an information security program in place designed to protect your data and meet the criteria for both ISO 27001 and SOC 2.

Continuous monitoring
We continuously monitor for unusual activity and have processes in place for incident response.
