Our approach to security

Seequent strives to secure information based on the three founding principles of Information Security – Confidentiality, Integrity and Availability.

We are committed to the establishment and ongoing improvement of an Information Security Management System that is in line with the requirements of the ISO27001:2013/17 security standard.

We aim to ensure the confidentiality, integrity and availability of our organisational, customer, stakeholder, business partner and employee information by suitable protection of the information and its processing infrastructure against threats, both internal and external.

Information Security Incident Management

We take Information Security very seriously. We are aware of the constant evolution of the security threat landscape, and that security events or weaknesses do arise from time to time.

We urge you to report any information security event or weakness that occurs or is believed to have occurred, to us immediately via e-mail to: [email protected]

Administration & Management

Read important information for people who manage Seequent software users.

For IT Administrators

If you need to know information relating to server requirements, network details and more.

Server & Admin Information

Standards and Certifications

Our software has been validated/certified to meet the specific needs of organisations.

Standards & Certifications

About Seequent ID

Use your Seequent ID to access your solutions, manage your info, and update security options.

Seequent ID