IT & Security SaaS Solutions - Curo

Compensation Software

Created by compensation experts, Curo provides best of breed, safe, secure & intelligent global compensation management software for the following functions.

Curo IT and Security

Curo provides a secure and reliable software-as-a-service (SaaS) solution. Hosting is available via our secure private cloud or via Amazon Web Services. Curo data centers run on leading edge physical infrastructure and the secure facilities are Tier 3, ISO 27001 certified.

As a reward analytics data-based solution, we understand that businesses will input sensitive data that necessitates the highest level of security which we provide.

See Curo in Action

Key Features

Curo was developed and is managed and supported solely by in-house onshore staff. It is agnostic to all adjacent technology systems (HRIS, Performance Management, Talent Management Systems, Payroll, etc.) through use of standard data import, export and API based transfer protocols. Single Sign On (SSO) capability is available through the SAML 2.0 standard (Identity or Service Provider Initiated).

Scalable, with 99.995% average monthly availability our solution uses proven, industry standard, technologies. The production hosting environment is triple-redundant across two physical stacks. Data replication is delivered to a geographically separate hot standby disaster recovery environment.

No third party data centres or cloud providers – all technology is hosted and managed by our UK based IT and comp experts who are vetted and only access your data (to client instructions) in order to perform its supplier obligations within a Service Agreement. Data is encrypted in motion and at rest, and we perform an annual independent penetration test by a third party. Curo acts as a data processor within the context of the Data Protection Act and in a similar role under GDPR requirements.

Data protection and back up
Personal and confidential customer data is individually backed up and encrypted regularly to protect it from any hardware failure or cyber-attack. It is also replicated in real time for disaster recovery purposes.