Trust Center


Deque takes the security and privacy of its customers seriously, implementing robust access controls, data protection measures, and encryption to protect sensitive information. The company has a comprehensive incident response plan in place to manage security incidents effectively. Additionally, Deque has strict policies and guidelines for remote login, email usage, media handling, and acceptable use to ensure the security of its information systems.

Business continuity

Deque’s strengths in relation to the Business Continuity (BC) and Disaster Recovery (DR) process include redundant services, strong internal and external communication, dedicated customer service, and knowledgeable technical personnel. Deque also has monitoring in place for the services and products it offers. Additionally, Deque has a disaster recovery plan that establishes procedures to recover Deque operations following a disruption resulting from a disaster.

ISO 27001

Deque’s Information Security Management System (ISMS) has been certified to the ISO 27001:2022 standard, demonstrating our commitment to protecting sensitive information and maintaining a robust security posture. This certification underscores the effectiveness of our security controls and our dedication to continually improving our information security practices. As a result, our clients can have confidence in the security and integrity of their data when working with Deque. If your organization is a potential or current client and would like a copy of our ISO 27001:2022 certificate, please email your request to [email protected].

Logo granted by AARC 360 that Deque is ISO 27001:2022 certified with certification number ISMS-032524-0001

External penetration testing

Deque Systems engages in annual external penetration testing to assess the security of their external network. The testing is performed by certified penetration testing firms, following a methodology that includes discovery, analysis, validation, exploitation, and reporting. This methodology ensures a thorough and consistent approach to vulnerability assessment and penetration testing.