Peak Security and Data Governance
The Peak platform
Is a centralised environment in which to manage data and perform data science workflows in a secure infrastructure. It empowers data scientists by giving them access to data without compromising on security or data governance.
Security
Ingrained in everything that we do at Peak
Security is ingrained in everything that we do at Peak, as it is core to our business resilience. We are ISO 27001 (Information Security Management System)-certified and undergo annual SOC 2 type 2 audits through an accredited third party auditor. We also comply with The Data Protection Act 2018, which is the UK’s implementation of the General Data Protection Regulation (GDPR).
Platform Security
Data must be protected with tight security
While we understand that data scientists need access to data to perform their job, data must also be protected with tight security. We balance these needs by allowing data scientists controlled access to data on the Peak platform. We provide SSO and MFA functionality to protect user accounts. To identify and mitigate risks, we conduct regular internal audits as well as external audits, and application scanning and penetration testing conducted by a third party security vendor.
Data Bridge
Connecting to the Peak platform
If data cannot leave your IT infrastructure, Data Bridge can connect it to the Peak platform without you ever having to move, duplicate or lose ownership of that data. Our Data Bridge connector uses your data storage security policies so that you always control the security key to your data. Data Bridge ensures that the integrity of your security and governance is not compromised, as your data stays secure under your lock and key.
Governance
The Peak platform is hosted on AWS
And has partnerships with cloud data infrastructure providers, for example Snowflake. Data on the Peak platform is encrypted at rest and in transit.
We use reputable third party services for secure identity management together with security best practices for effectively managing scope of permissions for cloud infrastructure.