Trust and security
At 6clicks, security is our top priority. We are dedicated to being a trusted and reliable platform for our customers and partners. We continually invest in enterprise-class security features and best practices for our cloud environment.

Security is our #1 priority
Reliable
Cloud infrastructure is designed for reliability and sustained optimal performance, with many redundancies and failover options at our disposal.
Scalable
Built to handle increased customer data and heavy user load. Giving consistent and predictable performance that scales perfectly with your business and customers' needs.
Trusted
We work closely with some of the world's largest service firms and enterprise brands, including those with intimate understandings of cyber risk and compliance.
Tested
Infrastructure and application instances are regularly tested for vulnerabilities, including both vulnerability scanning and independent penetration testing.
Our Security Commitments
1. Build on strong foundations
We know enough about security to build on the strong foundations of Microsoft Azure which is well-credentialed in terms of security, and we take advantage of its rich feature set to secure our infrastructure (mostly serverless!).
2. Involve everybody
The 6clicks executive team set the tone from the top with accountability for security, a CISO, communicated policies, and regularly monitored program performance through engagement with independent advisors, testers, customers, and regulators.
3. Maintain persistence
6clicks has established an Information Security Management System (ISMS), which triggers security activities to occur ongoing. We perform constant real-time monitoring, daily and weekly vulnerability scanning, regular penetration testing, and ongoing training.
4. Be transparent
Our philosophy is to be transparent about our security arrangements, and we share detailed information under confidentiality arrangements. We don’t pretend to be perfect (although we’re pretty good), and we’re happy to share what we’re still working on.
Technical Measures
-
Backup & Recovery
-
Cryptographic key management
-
Capacity Management
-
Anti-malware
-
Mobile Device Management
-
Code Review
-
DDoS Protection
-
Security Incident Response
-
Vulnerability Management
-
Web Application Firewall (WAF)
-
Encryption - Data in transit and at rest (AES 256-bit)
-
Multi-factor authentication
-
Privileged Access Management
-
Single Sign On (SSO)
-
Logging & monitoring
Policies & Practices
-
Information Asset Management
-
Security Risk Management
-
Policy & Control Management
-
Change Management
-
Supplier Security
-
Acceptable Use
-
System Acquisition and Development
-
Business Continuity
-
Security Issue Management
-
Management reviews
-
Internal & External Audit
-
Human Resource Security
-
Penetration Testing
-
Workplace Health & Safety
-
Physical and Environmental Security
Compliance & Audit
6clicks operates an ISO/IEC 27001 certified Information Security Management System (ISMS)
Data Sovereignty
The 6clicks platform optimizes global data storage based on security and compliance requirements in different jurisdictions.
6clicks has instances available in Australia, the USA, UK and UAE.
6clicks has launched 6clicks for Government with an Australian Government orientated assistance with plans to add a US Government orientated instance.
We will expand to other jurisdictions based on customer demand and compliance requirements.