QuoVadis Online Security Limited

QuoVadis Personal Signing Service (PERS)

A cloud-based personal signing service for internal and external users to sign PDF documents from any device. The service avoids issues of desktop support for smartcard drivers or signing software. PERS is well suited to corporate portals or SaaS solutions involving transactions requiring signature or approval, especially involving external/mobile users.


  • Simple deployment of roaming digital signatures from any device
  • Integrates to your existing web portal(s) or applications
  • 'Signing as a Service' scales with your needs
  • Automates credential management for registered users
  • Platform independent
  • Complies with signature laws and technical standards
  • Use of Adobe trusted / Qualified signatures as required


  • Integration with existing web portals/applications
  • Rapid installation & deployment
  • Highly scalable
  • LTV (Long Term Validation) of signatures
  • No data protection issues


£28 per user per year

  • Free trial available

Service documents

G-Cloud 9


QuoVadis Online Security Limited

Tanya Davis

0333 666 2000


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Community cloud
Service constraints No constraints
System requirements Any current, up-to-date browser is supported

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 x 7 service via eMail, web and telephone.
Emergency support is available on a 24 x 7 basis at no extra cost.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels 24 x 7 support online, telephone, eMail - NO ADDITIONAL COSTS
Use of GoToMeeting and similar systems for additional support if required Emergency 24 x 7 telephone support
Ticketing system
PKI widgets (several tools to help with managing certificates)
Dedicated account manager for every customer
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started On-boarding process includes online training & user documentation
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All certificate data can be extracted via XML from our certificate management portal (Trust/Link).
End-of-contract process Certificate management portal will remain active until all certificates have naturally expired.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No difference between mobile and desktop service.
Accessibility standards None or don’t know
Description of accessibility Accessible by any up-to-date browser
Accessibility testing None
What users can and can't do using the API An API is available for automation of certificate issue
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Interface can be customised
Full integration with existing portals/applications


Independence of resources Our technology is fully scalable and we regularly upgrade any aspect of the infrastructure to cope with peak demand.


Service usage metrics Yes
Metrics types Dashboard provides information on certificates issued/revoked etc
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Run a report and export via XML
Data export formats Other
Other data export formats XML
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Availability of Services. The QuoVadis Trust/Link Service will be operational 24 hours per day, 7 days per week, and 365 days per year. The services will be deemed operational if they are available 99.5 % of the time on a monthly basis. Scheduled downtime will not exceed seven hours per month, and will occur (i) between 6:00 p.m. on Saturday evening and 6 a.m. on Sunday morning, Atlantic Time, or (ii) at such other times and days as QuoVadis may deem necessary, provided QuoVadis gives Client at least three calendar days advance written notice of such other time and day for scheduled downtime.
Approach to resilience Available upon request. Standard meets all requirements of our industry accreditations - baseline, Webtrust, EV, AATL, Qualified certificate, eIDAS accreditations.
Outage reporting EMail alerts, and dashboard information. Also available through the API if used.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels 2-factor authentication necessary for all access
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Quality Management Services International (QMS)
ISO/IEC 27001 accreditation date 14/2/2012
What the ISO/IEC 27001 doesn’t cover Nothing
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Industry specific accreditations: Webtrust, EV, AATL, Qualified, eIDAS

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We are required to follow strict information security policies and processes to attain and retain our industry accreditations.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We are required to follow strict configuration and change management processes to attain and retain our industry-specific accreditations.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We are required to strictly manage vulnerability to attain and retain our industry-specific accreditations.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We are required to use lots of protective (pro-active) monitoring processes to attain and retain our industry specific qualifications.
Incident management type Supplier-defined controls
Incident management approach We are required to have very strict incident management processes to attain and retain our industry specific accreditations.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £28 per user per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Pilot projects can be catered for.


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑