Lead software developer gesturing to notes on a whiteboard

Built with security in mind

We use industry best-practice at every turn to ensure aXcelerate is a secure platform for our users

on-shore hosting



recovery point objective




for secure

Enterprise-grade protection

In addition to leveraging Amazon Web Services to grow and scale our application with ease, we follow a number of different protocols to ensure aXcelerate’s security at all times.

Data Protection
aXcelerate is only available over SSL with a minimum of TLS 1.2. Data at rest has extensive backup protection with frequent change logs, and sensitive data is encrypted at rest.
Third-Party Penetration Testing
We use a well-regarded security consultancy to conduct annual third-party penetration testing, as well as performing monthly scanning internally for vulnerabilities.
Incident Management
Our vast monitoring systems use threshold settings to send automated alerts to aXcelerate staff, ensuring issues are resolved before affecting end users.
Over 1000 organisations trust aXcelerate with their data

We give you the tools to control your training data

aXcelerate includes best-practice security tools to ensure a protected student and learning management system for our users

Role-based permissions
for secure system access
Multi-factor authentication
to protect user logins
Single sign-on
to elevate user experience
Access logs
for complete visibility
Database shards
for an enhanced server experience
Session records
to log user changes

Staff Security

Trust is a fundamental part of our company’s identity; it even makes an appearance as the final pillar in our company’s HEART value statement.

We conduct screening checks for new staff members to ensure a secure workforce that handles your data with integrity. We provide our employees with privacy and security training, giving them sufficient knowledge to support the data security of our customers.

A group photo of the aXcelerate team in front of their offices

Trust is at the heart of what we do

The final principle in our company’s core values, trust is paramount in everything we do as an organisation.

Two security operations officers having a discussion over their computers

Shared responsibility model

aXcelerate is committed to the continuous optimisation of the security performance of our cloud-based service, but this commitment must be shared by all our customers and users. The shared responsibility model is critical to reducing risk and mitigating vulnerabilities for all aXcelerate users.

If your organisation has questions regarding this shared model, please reach out to the aXcelerate team so we can work together to ensure maximum security and reliability.

Ready for secure training management?

Get in touch today.