Why Hubble?

A culture of security from day one

Trust and transparency are two of our key principles, and we have a security program that reflects this. As part of your journey with Hubble, we’re happy to arrange a call to answer any outstanding questions.

data segmentation
Data segmentation without compromise
encription
Customer controlled data encryption at rest
security 1
Culture of security integral to our business

Frameworks and Certifications

Hubble leverages control frameworks such as SOC2 and NIST, to help underpin our security program. We are engaged with leading audit firms to ensure continued compliance with applicable industry and regulatory standards. Our team is happy to discuss the details of these programs as a part of your onboarding process.

Security from the ground up

Hubble was founded by cyber security industry veterans, and has had a strong culture of security embedded into everything we do, from day one. From our product to our back office systems, security has been a priority — that we refuse to compromise on.

CSA CCM

Chief Information Officers.

CSA CCM

Chief Information Officers.

CSA CCM

Chief Information Officers.

CSA CCM

Chief Information Officers.

CSA CCM

Chief Information Officers.

CSA CCM

Chief Information Officers.

CSA CCM

Chief Information Officers.

Enterprise-grade security

Hubble has supported features, often only found in large enterprise businesses, from day one. Such features include out of the box identity federation / single sign-on and customer managed cryptographic key management — allowing you to maintain complete control of your data.

The Platform

Hubble incorporates security reviews into our Software Development Lifecycle Processes (SDLC). This includes automated scanning of code during the development lifecycle, from initial code authorship, to build and deployment.

 

In addition to our own red-team, Hubble is engaged with third party vendors to conduct assessments of many aspects of our platform’s security.

the platform new new

Bring complete visibility to your technology assets