Trust Center

Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Forage is an educational technology platform for developing and hosting open access virtual job simulations. These virtual job simulations are free for students and allow them to ‘try on’ what it is like to have a job at a company before they apply for a role, acting as a talent attraction and engagement tool that demystifies an employer brand, provides clarity about potential career pathways, and pre- skills candidates for the role. In return, employers maximise their recruiting and hiring efficiencies: because Forage programs are free, available 24/7, and are used by educational institutions worldwide, employers are able to attract a diverse pool of talent that they might not have been able to reach before. Beyond attraction, Forage programs are also used for nurture and engagement strategies, giving employers access to a pool of talent showcasing high signals of intent to apply, quality, and confidence in the roles pursued.

Our commitment to information security and data privacy is embedded in every part of our business. We have established an Information Security and Data Privacy Program to protect the confidentiality, integrity, and availability of the systems and data we manage on behalf of our students, employers, and education partners, while also ensuring that we meet our legislative and contractual privacy obligations. Forage also works with an independent third party audit firm to audit the core platform for compliance with SOC 2 Type 2 requirements.

Compliance

GDPR Logo
GDPR
SOC 2 Logo
SOC 2
VPAT Logo
VPAT
Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Risk Profile

Data Access LevelRestricted
Impact LevelModerate
Recovery Time Objective24-48 hours
See more

Product Security

Audit Logging
Data Security
Multi-Factor Authentication
See more

Reports

Network Diagram
Pentest Report
SOC 2 Report

Data Security

Access Monitoring
Backups Enabled
Encryption-at-rest
See more

App Security

Code Analysis
Software Development Lifecycle
See more

Data Privacy

Cookies
Data Into System

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
BC/DR
See more

Endpoint Security

Endpoint Detection & Response
Mobile Device Management

Corporate Security

Employee Training
Incident Response
Internal SSO
See more

Policies

Our Information Security policies are available on request. Please contact us for more details.

If you need help using this Trust Center, please contact our Cybersecurity Risk team.

If you think you may have discovered a vulnerability, please send us a note.

Powered BySafeBase Logo