Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items

Overview

Forage is an educational technology platform for developing and hosting open access virtual job simulations. These virtual job simulations are free for students and allow them to ‘try on’ what it is like to have a job at a company before they apply for a role, acting as a talent attraction and engagement tool that demystifies an employer brand, provides clarity about potential career pathways, and pre- skills candidates for the role. In return, employers maximise their recruiting and hiring efficiencies: because Forage programs are free, available 24/7, and are used by educational institutions worldwide, employers are able to attract a diverse pool of talent that they might not have been able to reach before. Beyond attraction, Forage programs are also used for nurture and engagement strategies, giving employers access to a pool of talent showcasing high signals of intent to apply, quality, and confidence in the roles pursued.

Our commitment to information security and data privacy is embedded in every part of our business. We have established an Information Security and Data Privacy Program to protect the confidentiality, integrity, and availability of the systems and data we manage on behalf of our students, employers, and education partners, while also ensuring that we meet our legislative and contractual privacy obligations. Forage also works with an independent third party audit firm to audit the core platform for compliance with SOC 2 Type 2 requirements.

Compliance

GDPR Logo
GDPR
SOC 2 Logo
SOC 2
VPAT Logo
VPAT
Start your security review
View & download sensitive information
Ask for information

Risk Profile

Data Access LevelRestricted
Impact LevelModerate
Recovery Time Objective24-48 hours
View more

Product Security

Audit Logging
Data Security
Multi-Factor Authentication
View more

Reports

Network Diagram
Pentest Report
SOC 2 Report

Data Security

Access Monitoring
Backups Enabled
Encryption-at-rest
View more

App Security

Code Analysis
Software Development Lifecycle
View more

Data Privacy

Cookies
Data Into System

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
BC/DR
View more

Endpoint Security

Endpoint Detection & Response
Mobile Device Management

Corporate Security

Employee Training
Incident Response
Internal SSO
View more

Policies

Our Information Security policies are available on request. Please contact us for more details.

If you need help using this Trust Center, please contact our Cybersecurity Risk team.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo