Search test library by skills or roles
⌘ K

Enterprise-grade data protection

Adaface provides the control and visibility features that recruitment admins need. Behind the scenes is a secure, sophisticated infrastructure built to protect your data while being transferred, stored, and processed. Our information security management framework is designed to assess risks and build a culture of security at Adaface.

Control and visibility

We’ve developed tools that empower recruiters to customize Adaface to their organization’s particular needs. Adaface dashboard provides control and visibility features, and provides tools to protect their accounts across various user interfaces. The Adaface Integration API also allows for partner product integrations with core IT processes. We help you ensure that only the right people can access your company’s information in Adaface.

Learn more about control and visibility

Information security

By default, Adaface encrypts data for all of our customers. We further protect your data with tools such as audit logs, data backups and recovery. We’re always assessing risks and improving the security, confidentiality, integrity, and availability of our systems. We regularly review and update security policies, provide our employees with security training, perform application and network security testing (including penetration testing).

Learn more about information security

Architecture overview

Adaface is designed with multiple layers of protection, including secure data transfer, encryption, network configuration, and application-level controls distributed across a scalable, secure infrastructure. Adaface offers governance and risk-management capabilities flexible enough to meet your organisation’s needs, no matter what they are. This includes global retention policies and custom terms of service.

Learn more about security architecture

Industry-accepted best practices and frameworks

Our security approach focuses on security governance, risk management and compliance. This includes encryption at rest and in transit, network security and server hardening, administrative access control, system monitoring, logging and alerting, and more.

We evaluated several of their competitors and found Adaface to be the most compelling. Great library of questions that are designed to test for fit rather than memorization of algorithms.

swayam profile image
CTO, Affable
Use the most candidate friendly assessment tool

(100% free to get started, no credit card required)

40 min tests.
No trick questions.
Accurate shortlisting.