Consenter® helps your teams to remain GDPR compliant whiles navigation the chaos with data privacy. Why not concentrate your business objectives whiles we handle the rest for you.
With Consenter®, you are empowered to manage all aspects of your business. Why not concentrate your core objectives whiles we handle the rest for you.
Let Consenter® help you to maintain records of all the processing activities which take place within the organisation..
Demonstrate Consent Compliance Through Automation with Consenter®.
Let Consenter® help you to track incidents and data breaches.
A risk-based approach to addressing the risks associated with third-party intermediaries.
Our well trained engineers are on stand-by to give you the support you need.
Request a free 30 days trial to get all these features and more free.
Privacy and Security is in our DNA
All your data lives in the UK on our secure cloud services platform. Our systems are hosted on Amazon AWS infrastructure, located in London. Amazon AWS has devoted an entire portion of their site to explaining their security measures, which you can find here: 317-205-3120 and here: /aws.amazon.com/security.
Built in extra layer of security for your account. Designed to ensure that you are the only person who can access your account, even if someone knows your password. We support mobile authenticator apps and devices, including Authy and Google Authenticator
All of the data is backed up hourly to multiple disks. Backups are encrypted and distributed to various locations within the UK. Backups are saved for a period of 25 days.
All transmissions to and from Talents Team, including sign-on, are encrypted at 256-bit and sent through TLS 1.2, adhering to the FIPS 140-2 certification standard. Our SSL implementation passes Qualys SSL Labs with very high score grades. We monitors the changing cryptographic landscape and upgrades the cipher suite choices as the landscape changes, while also balancing the need for compatibility with older clients.
We protect your login from brute force attacks with rate limiting.
All passwords are filtered from all our logs and are one-way encrypted
in the database using