Why CIOs choose OSV

Our services are delivered directly inside your Workday applications without expanding your IT footprint. Maximize your Workday investment, reduce your reliance on integrations, and enhance security across your operations.

Trusted by more than 1,100 companies

Trusted by more than 1,100 companies

Tripadvisor
Hulu
Independent Bank
Tate & Lyle
Renishaw
OVO Energy
logo-JazzPharma_bw
qad_logo
Innisfree2
RHA
tradedesk-logo
2U_logo
eisneramper-logo
Equifax
greenix_logo
logos_website_assets_HKS

Our reputation as a trusted service partner matters to us. That’s why a key component of our BPaaS offering is security. We balance efficiency, automation, and reduced customer effort with a commitment to processes and tools that protect your tenant, follow today’s regulations, and provide ultimate transparency. We strictly adhere to our third-party audited SOC 1 Type II and SOC 2 Type II reports, which are updated annually and available to all customers. 

security

One focus: Workday

Our undistracted focus on Workday drives us to innovate specifically for Workday’s suite of applications. What’s more, we use patented technology to work securely and transparently inside those applications. You don’t need to worry about monitoring and maintaining integrations or adding new software to fill the gaps. No other Workday partner does this.

Workday

Governance of processes

We have procedures in place to authenticate all users to cloud-based and on-site systems. This helps to support the validity of transactions and ensures timely action related to requesting, establishing, issuing, suspending, and closing user accounts. Additionally, IT installs anti-virus and anti-malware software on all servers and personal computers.

WhyCIO_img_1

Governance of infrastructure

We employ physical security policies and procedures as a baseline for safeguarding the physical assets and the integrity of the processing environment. For physical access control, OneSource Virtual uses a computer-based proximity card system. Access to sensitive areas, including computer rooms and check printing rooms, requires a separate level of management approval.

governance_of_infrastructure

A partner you can trust

Book a meeting with one of our security experts to gain further clarification as well as detailed documentation on security protocols, certifications and our team.

Speak to our experts