Security is our top priority

At JET, we take security very seriously. As your trusted supplier, we are committed to upholding the highest security standards. We do this by adhering to strict security regulations and obtaining the necessary accreditations, ensuring your data and operations are always protected.

consumer event registration
consumer event registration

Security is our top priority

At JET, we take security very seriously. As your trusted supplier, we are committed to upholding the highest security standards. We do this by adhering to strict security regulations and obtaining the necessary accreditations, ensuring your data and operations are always protected.

Our Security Standards

We are proud to say that we uphold the following security standards:

ISO 27001
We are ISO 27001 certified, meaning we uphold the international standard for managing information security

PCI 4.0

Cyber Essentials Certified Plus

GDPR Compliant

Our Security Policies

We have implemented and continue to manage a comprehensive range of security policies governed by our parent company, Vesta Software Group, and overseen by our team here at JET.

Vesta Software Group Policies

General Information Security Policy

User Access Policy / Acceptable Use Policy

Password Policy

Jonas Event Technology Policies

Business Continuity Plan

Disaster Recovery Plan

Data Backup and Recovery Policy

Logical Access Control Policy

Change Management Process

Risk Management Process

Network Security

When it comes to network security, we have implemented a comprehensive set of measures, including:

Firewalls

Web Application Firewall (WAF/CloudFlare)

Anti-DDoS (CloudFlare)

Intrusion Detection System

JET back-office access is secured through a VPN with multi-factor authentication, available only to need-to-know staff.

Encrypted communications (HTTPS)

Operational Security

For operational security, our R&D team ensures smooth and effective operations by:

Performing monthly patch management as a standard practice

Regularly reviewing data backups

Forwarding all platform logs to a Security Information and Event Management (SIEM) solution

Conducting quarterly and annual reviews of our security policies and management processes

Business Continuity and System Resilience

Our infrastructure has separate layers for internal, test, and production systems as well as front-end and back-end databases.

We have separate data centres for production and disaster recovery to ensure reliability.

Our systems are designed to handle more capacity than needed, even during peak times

We have incorporated a load management system to prevent overload

Content delivery is optimised with CloudFlare caching for better performance.

We have a fully functional disaster recovery setup for emergencies.

Our tier 1 data centres are highly secure and ISO 27001 certified.

Data Flow

How data flows through our system:

Our Security Standards

We are proud to say that we uphold the following security standards:

ISO 27001
We are ISO 27001 certified, meaning we uphold the international standard for managing information security

PCI 4.0

Cyber Essentials Certified Plus

GDPR Compliant

Our Security Policies

We have implemented and continue to manage a comprehensive range of security policies governed by our parent company, Vesta Software Group, and overseen by our team here at JET.

Vesta Software Group Policies

General Information Security Policy

User Access Policy / Acceptable Use Policy

Password Policy

Jonas Event Technology Policies

Business Continuity Plan

Disaster Recovery Plan

Data Backup and Recovery Policy

Logical Access Control Policy

Change Management Process

Risk Management Process

Our Security Policies

We have implemented and continue to manage a comprehensive range of security policies governed by our parent company, Vesta Software Group, and overseen by our team here at JET.

Vesta Software Group Policies

General Information Security Policy

User Access Policy / Acceptable Use Policy

Password Policy

Jonas Event Technology Policies

Business Continuity Plan

Disaster Recovery Plan

Data Backup and Recovery Policy

Logical Access Control Policy

Change Management Process

Risk Management Process

Network Security

When it comes to network security, we have implemented a comprehensive set of measures, including:

Firewalls

Web Application Firewall (WAF/CloudFlare)

Anti-DDoS (CloudFlare)

Intrusion Detection System

JET back-office access is secured through a VPN with multi-factor authentication, available only to need-to-know staff.

Encrypted communications (HTTPS)

Operational Security

For operational security, our R&D team ensures smooth and effective operations by:

Performing monthly patch management as a standard practice

Regularly reviewing data backups

Forwarding all platform logs to a Security Information and Event Management (SIEM) solution

Conducting quarterly and annual reviews of our security policies and management processes

Business Continuity and System Resilience

Our infrastructure has separate layers for internal, test, and production systems as well as front-end and back-end databases.

We have separate data centres for production and disaster recovery to ensure reliability.

Our systems are designed to handle more capacity than needed, even during peak times

We have incorporated a load management system to prevent overload

Content delivery is optimised with CloudFlare caching for better performance.

We have a fully functional disaster recovery setup for emergencies.

Our tier 1 data centres are highly secure and ISO 27001 certified.

Data Flow

How data flows through our system: