Peak Security & Governance

The Peak platform

Is a centralised environment in which to manage data and perform data science workflows in a secure infrastructure. It empowers data scientists by giving them access to data without compromising on security or data governance.



Ingrained in everything that we do at Peak

Security is ingrained in everything that we do at Peak, as it is core to our business resilience. We are ISO 27001 (Information Security Management) and SOC 2 Type II certified. We also comply with The Data Protection Act 2018, which is the UK’s implementation of the General Data Protection Regulation (GDPR).

Platform Security

Data must be protected with tight security

While we understand that data scientists need access to data to perform their job, data must also be protected with tight security. We balance these needs by allowing data scientists controlled access to data on the Peak platform. We provide SSO and MFA functionality to protect user accounts. To identify and mitigate risks, we conduct regular internal audits as well as external audits, and application scanning and penetration testing conducted by a third party security vendor.

Data Bridge

Connecting to the Peak platform

If data cannot leave your IT infrastructure, Data Bridge can connect it to the Peak platform without you ever having to move, duplicate or lose ownership of that data. Our Data Bridge connector uses your data storage security policies so that you always control the security key to your data. Data Bridge ensures that the integrity of your security and governance is not compromised, as your data stays secure under your lock and key.

Find out more


The Peak platform is hosted on AWS

And has partnerships with cloud data infrastructure providers, for example Snowflake. Data on the Peak platform is encrypted at rest and in transit.

We use reputable third party services for secure identity management together with security best practices for effectively managing scope of permissions for cloud infrastructure.

Contact the Security Team

If you require more information about our security protocols or would like sight of any of our certifications, then please contact the team using this form.