Enterprise Grade Security and Compliance

Built for trust and security—our enterprise-grade protection keeps your data safe, encrypted, and fully compliant.

Certified trust at a glance

ISO 27001 Compliant

PDPL Compliant

SOC2 Compliant

Holistic Data Protection for Continuous Compliance

Support, advice and everything in between, we’re here to help.

Access & Identity Controls

Role-based access + auto-delete after 90 days reduce insider risks

Secure Cloud Infrastructure

Data on GCP & AWS with firewalls, scans, & quarterly pen tests

Business Continuity & Disaster Recovery

Backups + DR drills keep ops online in outages

Application Security Lifecycle

Automated scans & code tests catch bugs pre-release

Continuous Monitoring & Incident Response

24/7 monitoring reduces threats

Data Portability & Ownership

One-click export & clear deletion workflow give you full data control

Frequently Asked Questions

Yes. MFA is available and adds an extra layer of security to your account, helping you protect sensitive HR and payroll data by requiring two-step verification during login.

All production data lives on encrypted servers in the GCC (either Google Cloud Platform Saudi Arabia or AWS Bahrain). Keeping data in‑region supports local compliance requirements and reduces latency for Gulf‑based customers.

Our Business Continuity & Disaster Recovery (BCDR) strategy combines hourly incremental backups, nightly full backups, and geographically separate replicas. We run a full‑scale DR test every year to prove we can meet our sub‑4‑hour Recovery Time Objective (RTO).

Jisr is independently audited for ISO 27001, SOC 2 Type II, and GDPR alignment. These attestations confirm our controls for information security, availability, and privacy are best‑in‑class.

Absolutely. Jisr supports SAML 2.0 and OpenID Connect, so you can plug in Okta, Azure AD, Google Workspace, or any standards‑based IdP and let employees sign in with one click.

Every code change passes automated SAST/DAST scans in our CI/CD pipeline. We layer that with quarterly penetration tests by CREST‑certified partners and weekly vulnerability management sweeps. Any critical finding is patched within 24 hours.

Yes. Admins can generate a full, structured Excel export (or via API) at any time—no hidden fees, no support ticket required. Your data stays yours, always.