Security Measures
Security is a top priority at Tendium. We are committed to ensuring the confidentiality, integrity, and availability of data, while safeguarding privacy and maintaining trust. This article outlines our security framework and the controls we have implemented.
The Importance of Data Security
In the world of public procurement, confidentiality regarding tenders and strategies is key. We recognise the importance of protecting innovation, business relationships, trade secrets, and sensitive information. At Tendium, we facilitate all work related to public procurement and tenders without compromising security – ensuring your competitive advantage.
Safekeeping Your Data
Security Routines and Measures
Tendium’s Security Team
The Security Team at Tendium ensures that security procedures and measures are followed by employees, customers, and other relevant parties. Promptly addressing any security disruptions, the Security Team keeps a close watch to make sure that platform updates go smoothly without compromising our security infrastructure.
Have you discovered or do you suspect a security breach on the Tendium platform? Do not hesitate to contact our Security Team at security@tendium.com, and we will immediately look into the issue.
Certified Hosting
Our services are hosted on Amazon Web Services (AWS). AWS has implemented the following security measures, among others:
Storage locations
AWS selects their data and control centre locations carefully, considering both geographical and environmental factors. These locations are equipped with sensors to detect climate or weather changes, along with security measures such as CCTV, intrusion alarms, and special manned entrances to guarantee a high level of protection.Access rules and security updates
Employees’ access to data systems follows strict rules, with continuous updates to security operating systems.Technical solutions for continuity
AWS has implemented solutions that enable traffic to move between servers without the risk of overload, ensuring that operations can continue without interruption in case of technical failures. Backup generators also protect functionality in the event of electrical or power failures.Backup and risk management
Regular backups are made to and between resilient and independent systems. The infrastructure and data centre’s risk management is systematically evaluated to minimise any threats.Certifications and third party evaluations
AWS is certified with ISO and CSA STAR, and they conduct regular third-party evaluations to review security.
Read more about AWS and their security work here.
Last updated: 2026-02-26


