
Information Security & Technology Consulting


We're committed to your security
We keep security at the heart of our products, infrastructure, and policies to protect your accounts and data.

Skillable uses the most sophisticated technologies and best practices available to ensure that our technology stack, accounts and data, as well as networks and physical access across our organization have the highest security and privacy.


Protecting the
Learning Environment

Protecting Your Data
Protecting Your Privacy
Skillable leverages the built-in security services of AWS and Azure (both ISO 27001 compliant) and adds additional protections. We use dedicated, redundant firewall and intrusion detection systems, separated and managed environment instances, proactive 24/7 system monitoring, and regular Internet security and vulnerability testing. Skillable also uses multi-factor authentication, role-based account access, as well as HTTPS (TLS 1.2>) for communications.
With industry-standard data protection, all data in transit and rest that interconnects with our datacenters is automatically encrypted, including encryption using 256-bit Advanced Encryption Standard (AES). Firewalls, Data Loss Prevention (DLP), and close log and activity monitoring are added protection. Your data is only accessed by those who use it.
Skillable ensures that our technology stack, accounts and data, as well as networks and physical access across our organization have the highest security and privacy. Data access is limited by role, least privilege, and need to access according to data protection regulations and contract agreements. We use background checks, staff training, policies, and Independent comprehensive compliance audits to verify security.

Protecting the Organization
Security at Skillable is everybody's responsibility. We utilize a dedicated security and compliance team that provides ongoing guidance and continually advances security. Skillable uses security awareness and training and regular assessments to build in security. Protecting the organization also includes backup, business continuity, and disaster recovery practices.

Protecting the
Software Environment
Skillable builds security controls into our software and regularly uses third-parties to verify our systems. We implement secure SDLC practices, encrypted password storage, tightly controlled and monitored access to development, testing, and operational environents. Multi-factor authentication is used for all system access and we support Open ID and Azure Active Directory Federation.


SOC 2
(Type II)
Trust Services Principles

SOC 3
Service Organization Controls
​
Download the Report

Microsoft Supply Chain Security Assessment & Consulting Program (SCSAC)
​
Microsoft's Supply Chain Security Assessment & Consulting Program (SCSAC) regularly assesses Skillable using a risk-based framework, holding Skillable to the same security standards that Microsoft uses.
EU General Data Protection Regulation (GDPR)
​
Skillable is committed to helping its customers understand their rights and obligations under GDPR.
Skillable utilizes tools and processes to meet compliance with
GDPR requirements.