-
Who we help
-
Work in a different sector?
Whatever sector you work in, we have functionality that can help
Learn how we can support you
-
Software
-
Explore accessplanit
See our software in action at your own pace in our sneak peek library.
View accessplanit sneak peeks -
What is training management software?
What training management software is and benefits for your training business.
Read TMS guide
-
What you get
-
-
Implementation & support
Our team of experts will guide you through every step of your journey.
Learn about our support -
Request a quote
Tell us about your requirements and receive a personalised quote.
Request your quote today -
How we work
Understand what to expect on your journey with accessplanit.
View the accessplanit process
-
-
Who we are
-
-
Resources
-
- Contact
Platform Security.


Security is our top priority
At accessplanit, security is built into every part of our platform. We’ve made it a priority to protect your data through strong infrastructure, clear policies, and robust access controls.
We’ve worked hard to achieve some of the most respected and rigorous security certifications in the industry, and we’re constantly reviewing and improving our approach to stay ahead of potential threats.

Certified & compliant
We’re fully ISO 27001 certified – the internationally recognised standard for information security management. This means we follow best practice when it comes to protecting your data, with robust processes in place to manage risks, respond to threats, and maintain confidentiality, integrity and availability.
We’re also Cyber Essentials Plus certified – the highest level of government-backed cyber security assurance in the UK. This involves independent testing of our systems and processes to ensure we’re protected against common cyber threats, such as malware, phishing and unauthorised access.
We’re the only major training management system (TMS) provider to hold the Cyber Essentials Plus certification – giving you confidence that your data is in safe hands.
Access & authentication
We offer a range of tools to help you control who can access your platform and how:
-
Single Sign-On (SSO) support for simplified, secure logins
-
Multi-Factor Authentication (MFA) available as an additional layer of protection
-
Custom password policies, configurable to match your internal security requirements
-
Session timeout controls – set your own idle timeout rules to reduce the risk of unattended access
Encryption & infrastructure
All data is encrypted in transit as standard (TLS 1.2), and we can also encrypt data at rest on request (AES 256). Each customer’s platform instance is physically separated to guarantee data isolation.
We offer a 24-hour Recovery Point Objective as standard, with a 2-working-hour SLA for Recovery Time Objective. However, the option to upgrade to a 15-minute RPO is available with a slightly extended RTO of 2+ working hours.
You can read more about our infrastructure and system-level protections in our full Security Document (PDF).
GDPR
Our platform and policies are fully aligned with GDPR and the UK Data Protection Act. You have control over your own data retention rules, and we provide clear documentation outlining how we process and store your data. You can view this in our Data Processing Agreement.