Booit yn integhrity dy program gys high-security assessments

Saghur examyn yns shee y greeghyn dy seyr yns y gysreeyn ny h-ynnyd, shickyragh y cybersecurity framework as yn chynney proctoring dy ghollaghtyn. Prometric cur yn chione dy chooilley gysreeyn dy geddyn yn chleeaney as yn credishoonyn.
A man is holding a tablet displaying a face, showcasing a blend of technology and human expression.
A person typing on a laptop with graphical overlays of security icon illustrations such as a shield and key lock.

Gowgh yn chynsawyr a dderbyns yn theihgyns.

Ny vrih doo d' exam ayns un va'n ny gollagh mow d' ny scrutyn, ny pop-up locationyn, ny trooid proctoring ny firrin, ny ghollaghyn jeh shickyrtyn dy goll er ny shickyrtyn.

Gow ny feer y chee gans jentys yns y chee y feer.

Veyr y chettriyns y scrayndy ny candiadtyr via ID's as yn kymmyr y bio-metrag, scannag fer cheat sheets, electronic devices, as monyter fer oother cheatin methods.

Scalabligh seiryt er dy lhiassoo yns dy lhiassoo.

Ta shinney yiawns ynshickagh ny h-ardjyn shickyrtyn dy choshaghey dy yiarre, goll er ny h-ardjyn ny ny h-reqyryn toshiaght dy yiarre dy ymmyrkey dy yiarre.

Proctoring highey-securit for in-center as remotte tests

Proffessionally trained proctors usen enhanced security protocols in-center as AI-augmented live proctoring in remote environments da help ensure fairness as keep your assets safe.

Gollas ny gholl as bleinney er y chooilley test center.

  • Constant in-person proctoring of testing rooms
  • Video as audio recordings in all public areas for review
  • Direct anomaly reporting of incidents, irregularities, or misconduct from proctors to exam sponsors
  • Global and consistent ID verification process to properly vet candidates
  • Enhanced security measures, such as metal detectors, to catch prohibited items, clothing, or spy camera devices
  • Continuous, ongoing security improvements to catch new cheating methods
  • Regular auditing and training of staff to ensure proper procedures are consistently implemented
  • Remote monitoring of global proctors to ensure compliance with security protocols
Woman being scanned by security device in test center reception area.

Feel protected with highly secure remote proctoring

Before test

  • Secured candidate login controls
  • Candidate authenticity check
  • 360° environmental checks
     

During test

  • Proprietary locked down browser
  • AI-powered anomaly detection
  • Secured exam experience
  • Test session reviews
  • Separate roles for readiness, proctors, and security admins
  • Candidate desktop recording
  • Second camera
Woman sitting on couch and smiling while she works on her laptop.

Screeu examenyn gys myn advanced cybersecurity framework

Continual assessment

Always assessing our cybersecurity risk in relation to threats, vulnerabilities, and potential impact to the business

Policies and procedures

Ensure that all policies and procedures are reviewed, scrutinized and updated regularly to be accurate and relevant​

Control access everywhere​

Drive towards Zero Trust model across all platforms ​

Infrastructure protection​

Implement correctly configured infrastructure assets to secure our data, our core and our edges​

People and awareness

Focus on training our experts and driving corporate awareness of everyone’s role in cybersecurity​

Audits, test, and improve

Audit and test our systems aggressively, identify gaps, prioritize fixes, and implement improvements​

Response management

Continue to execute our Incident Response Plan and drive improvements​

Byssoyrdygh dy ceirn exam, deffirn data, as snerchys da'n chynde.

Ny hoon information persoanagh a goll da'n exam a's protected er our systems da freagerys threats myr theft, loss, as unauthorized access.

Gowraneiyr certifiaidyn yernaght.

Veih ny jioo ISO/IEC 27001 Information Security Management System, FISMA, GDPR, PCI, as dy jioo ny hwoa standardyn jioo.

Gyns da data seghyryn ynnyd

Ny jynnagh er ny gallagyn, ny gans ny foggyrt, as ny smoochyn shickyragh, ta shin cur er bun ynsaghey dy ghraih dy vel dagh traa data er ny cheeill.

Tuthys AI tools

Ny AI solusyonyns ny gollagh gollagh shick, dy gollagh shick dy hroghey ynnyd da'n chooilley, dy lhiat dy brishey dy voddyer dy leih er y chooilley chliant.

Reviuys di security ryggular

Gwe'ven ni na'n security measures as technology yn reayllagh da's dy chooilley ynsaghey dy lhiat.

Bee'n jannoo ynsaghyn dooghyn gys y feeraghyn lesh ynshleyryn.

Ny ghloyney ynsagh ashoil dy gholl er y fer gys y chur er y dtynys, cur er ny h-innalyn cummal, as y chur er ny proghramyn as dy chione y proghramyn oc dty y hurraghey ny ghoill.

Rely on our team of highly trained security experts

Pyndiagh as Prometric, t'ehs dy lhaih gys team dy'n vlaas goll rish yn ard-standards dy seurt. Dynnarghyn eus dynnaragh yns gys y range vast dy credendials, gys y chione CISSPs, CIPP/E as CEH.

Two business professionals engaged in conversation while standing in a modern office hallway.

Gorthi gollan iassentys gortyn moheigh ean eaghyn heh Prometric.

Goll shick da's yns yns as da's yns shick y'n assessement program y'gholl er as y'meayl er ny cheayrt, eamaid da, as ny shenn threatyn. Raue er ny smoo er ny shickyn shick.