IT & Security SaaS Solutions - CuroComp

Compensation Software

Created by compensation experts, Curo Compensation provides best of breed, safe, secure & intelligent global compensation management software for the following functions.

CuroComp IT and Security

CuroComp provides a secure and reliable software-as-a-service (SaaS) solution. Hosting is available via our secure private cloud or via Amazon Web Services. Curo data centres run on leading edge physical infrastructure and the secure facilities are Tier 3, ISO 27001 certified.

As a reward analytics data-based solution, we understand that businesses will input sensitive data that necessitates the highest level of security which we provide.

Explore

Key Features

Saas
CuroComp was developed and is managed and supported solely by in-house onshore staff. It is agnostic to all adjacent technology systems (HRIS, Performance Management, Talent Management Systems, Payroll, etc.) through use of standard data import, export and API based transfer protocols. Single Sign On (SSO) capability is available through the SAML 2.0 standard (Identity or Service Provider Initiated).

Resilient
Scalable, with 99.995% average monthly availability our solution uses proven, industry standard, technologies. The production hosting environment is triple-redundant across two physical stacks. Data replication is delivered to a geographically separate hot standby disaster recovery environment.

Secure
No third party data centres or cloud providers – all technology is hosted and managed by our UK based IT and comp experts who are vetted and only access your data (to client instructions) in order to perform its supplier obligations within a Service Agreement. Data is encrypted in motion and at rest, and we perform an annual independent penetration test by a third party. Curo acts as a data processor within the context of the Data Protection Act and in a similar role under GDPR requirements.

Data protection and back up
Personal and confidential customer data is individually backed up and encrypted regularly to protect it from any hardware failure or cyber-attack. It is also replicated in real time for disaster recovery purposes.