Continuous Security Control Monitoring

Shotstack utilises enterprise-grade best practices to protect our customers data.

Continuous Security Control Monitoring


Security controls




Uptime SLA

Shotstack uses best-in-class automation platforms to continuously monitor 200+ internal security controls across the organisation against the highest possible standards.

Automated alerts and evidence collection allows Shotstack to confidently prove its security and compliance posture any day of the year, while fostering a security-first mindset and culture of compliance across the organisation.

Employee Trainings

Building a security-first culture

Security is a company-wide endeavour. All employees complete an annual security training program and employ best practices when handling customer data.

Third-party security audits

Annual penetration testing

Shotstack works with industry leading security firms to perform annual network and application layer penetration tests.

Secure Software Development

Proactive vulnerability detection across the stack

Shotstack utilises a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

Data Encryption

Uncompromising data protection

Data is encrypted both in-transit and at rest using KMS and HTTPS.