objective
SECURITY AT OBJECTIVE

Software you can trust

Security is built into our products, infrastructure and processes from inception, so that you can be assured that your organisation’s information assets are safeguarded.

Img banner security at objective

Security, reliability, privacy, and compliance

Objective takes its commitment to security seriously. Our government customers and those in regulated industries are delivering important community and national outcomes, in doing so, they are responsible for managing some of the most confidential, sensitive, private and personal information in the world.

At Objective, security not just a compliance program, it is a culture. It is built into our software applications from inception, it is embedded into our processes and is nurtured in our people.

Our commitment to security

Objective is continually investing in security to meet the standards of our most security-conscious customers.

Img security development

Security built-in

Automated dynamic application security testing and vulnerability testing.

Img security audit

Audited

Continual program of external audits and 3rd party penetration testing.

Img security encrypted server

Encryption

Data encrypted in transit and at rest.

Img security staff

Employees vetted

Employee screening aligned to AS 4811:2022.

Img security experience

Experience

30+ years of security and compliance program.


Highest level certifications and assessments

Demonstrating our commitment to security our products and company have been assessed and certified to the global standards. A compliance program ensure we keep current.

Logo security iso 27001

ISO 27001

ISO 27001 is recognised as the premier information security management system (ISMS) standard around the world.


DOWNLOAD APAC CERTIFICATE

DOWNLOAD UK CERTIFICATE

Logo security iso 9001

ISO 9001

ISO 9001 sets out the criteria for a quality management system and ensures that our customers get consistent, high-quality products and services.


DOWNLOAD APAC CERTIFICATE

DOWNLOAD UK CERTIFICATE

Logo security irap

IRAP

Infosec Registered Assessor Program (IRAP) maintains accredited IRAP assessors who assess services against the Australian Signals Directorate’s (ASD) Information Security Manual security controls to the required clearance level. Objective Connect and Objective Nexus are IRAP assessed up to PROTECTED level documents.


OBJECTIVE CONNECT ASSESSMENT

OBJECTIVE NEXUS ASSESSMENT

Logo security csa cloud security alliance

CSA STAR

The Cloud Security Alliance (CSA) is the world’s leading organisation dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.


LEARN MORE

Logo security defence industry security program disp

DISP

The Defence Industry Security Program (DISP), which Objective Corporation is a member of, is managed by the Defence Industry Security Office (DISO), supports Australian businesses to understand and meet their security obligations when engaging in Defence projects, contracts and tenders.


Logo security cyber essentials plus

CYBER ESSENTIALS PLUS

Cyber Essentials is an effective, UK Government backed scheme that helps protect organisations, against a whole range of the most common cyber attacks.


DOWNLOAD CERTIFICATE


Security advisories

Objective posts information relating to the latest security advisories on the Objective Support Knowledge Base

Access to this information is gated by authentication to the site as required, subject to the severity of the issue.


Vulnerability Disclosure Program

Objective is committed to maintaining the security of all software products, solutions and services that it provides to its customers and encourages responsible security research.

Objective welcomes disclosure of any in-scope findings that come as a result. Please read our Vulnerability Disclosure Program policy. 


Security of our cloud and hosted products

Understand the security posture of Objective’s SaaS and hosted applications and how these solutions address the core tenants of information security – confidentiality, integrity and availability (CIA).

Img resource thumb security position nexus 670x400

Security Position

Objective Nexus Security

Discover how Objective Nexus addresses the core tenants of information security - Confidentiality, Integrity and Availability.

Read More
Img resource thumb security position connect 670x400

Security Position

Objective Connect

Discover how Objective Connect has systems and processes in place to continuously safeguard your sensitive information.

Read More
Img resource thumb security position keystone 670x400

Security Position

Objective Keystone

Discover how Objective Keystone addresses each of the core tenants of information security; Confidentiality, Integrity and Availability.

Read More
Img resource thumb security position keyplan 670x400

Security Position

Objective Keyplan

Discover how Objective Keyplan addresses each of the core tenants of information security; Confidentiality, Integrity and Availability.

Read More

Read the latest security related blog posts

Read the latest blog posts related to security at Objective.

Img resource thumb objective connect feature release mfa 670x400

Blog Post

Take Objective Connect security to the next level

Learn how users can adopt mobile authentication to securely access their account.

Read More
Img resource thumb blog objective connect security featuring cto video

Blog Post

IRAP Assessed Cloud Collaboration – why experience matters [Part 3 of 3]

Discover the security gains when partnering with a vendor that gets government.

Read More
Img thumb blog MISA

Blog Post

Objective joins Microsoft Intelligent Security Association

Joining MISA builds on Objective's longstanding collaboration with Microsoft and further strengthens our integration with Microsoft 365

Read More