Trust Centre
Security
Statement
Glopal’s information security program is based on documented policies and is partially SOC 2 certified. It is designed to ensure the secure handling of data and maintain client confidence. Key focus areas include data protection through the use of encryption for data at rest and in transit, alongside access controls to limit data exposure and system management, which covers the configuration, hardening, and ongoing monitoring of IT infrastructure. Threat response is addressed through a defined incident response plan, supported by a designated team trained to detect, contain, and respond to security events in a timely manner.
Security is integrated throughout Glopal’s operational processes. Application and network environments follow secure development lifecycle practices, incorporating measures such as input validation, code reviews, and automated security testing. Infrastructure is supported by protective controls including firewalls and continuous vulnerability scanning to help identify and remediate risks. Access to systems and data is governed by Role-Based Access Control (RBAC), with safeguards such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO) in place to strengthen authentication. Password management follows defined policies, and user access is regularly reviewed to ensure it remains appropriate to users’ roles and responsibilities.
Operational resilience is considered in system design and planning. This includes implementing redundancy for critical components, scheduled backups of both data and configurations, and periodic testing of backup recovery processes. Disaster Recovery (DR) and Business Continuity (BC) plans are maintained and periodically reviewed to ensure readiness in the event of a significant disruption.
Third-party risk is managed through a structured vendor assessment process that considers the security posture of suppliers, with a preference for those holding relevant certifications. Critical vendors are engaged under Service Level Agreements (SLAs) that define expectations for security, availability, and response.
To support the security program, Glopal provides ongoing employee training that includes privacy awareness, phishing simulations, secure coding guidance for development teams, and general security best practices. These efforts help foster a culture of security awareness and accountability, reinforcing Glopal’s commitment to operating in a secure, responsible, and transparent manner.
Compliance &
Certifications
Glopal maintains key security certifications and compliance, including SOC 2, GDPR, and PCI DSS.
Policies
At Glopal, our security and compliance framework is built with SOC 2 as our guiding principle. These policies are the foundation of our trust and risk management. By formally documenting these practices, we ensure we protect customer data, secure our systems, and respond swiftly to any threats. This commitment allows our team to operate with complete security and transparency, providing you with a reliable and trustworthy global solution.
Application Security
Glopal prioritizes application security through controlled change management, secure development practices, and comprehensive activity logging.
Network Security
Glopal strengthens network security through regular testing, traffic filtering, vulnerability scanning, secure remote access, and timely system updates.
Training
Glopal provides ongoing training to employees and developers focused on privacy, phishing awareness, security best practices, and secure development.
Access Control
Glopal enforces role-based access, multi-factor authentication, and single sign-on, supported by secure password policies and regular access reviews.
Incident Managment
Glopal maintains defined incident response processes with dedicated teams, audit logging, and regular testing to ensure timely and effective handling of security events.
Resilience
Glopal ensures service reliability through monitored SLAs, system redundancy, regular backups, and tested disaster recovery and business continuity plans.
Third party vendors
Glopal manages third-party relationships through security reviews, prioritizing certified partners and establishing SLAs with critical suppliers.

