We don’t just meet the bar. We raise it.
At Enhanced Voting, security is foundational—built from product design through deployment to safeguard voters, election officials, and the democratic process.
We work with election offices whose mission can’t be compromised. That’s why we undergo independent third-party assessments, practice full transparency, and build resilient, verifiable solutions.
SOC 2 Type II Certified
Trust. Verified.
- Protecting sensitive election and voter data
- Maintaining strong controls over availability, confidentiality, and privacy
- Ensuring continuous security monitoring and accountability
This is backed by ongoing annual third-party audits across all five Trust Service Criteria.
RABET‑V Verified
Raising the bar for non‑voting election technology
In June 2025, our electronic ballot delivery solution, Enhanced Ballot, became the first of its kind to earn verified status through the RABET‑V program by the Center for Internet Security.
- Meets secure architecture and product standards
- Supports independent verification and continuous improvement
- Tested via a rapid, transparent, reproducible process
“Achieving this level of approval with RABET‑V demonstrates our unwavering commitment to enhancing the security of our products.”— Aaron Wilson, President of Enhanced Voting
Our 3-Part Security Philosophy
1. Design
- Secure software development lifecycle (SSDLC)
- End-to-end encryption for data in motion and at rest
- Role-based access controls and audit logs
2. Testing
- Internal QA and stress testing
- Third-party penetration tests and vulnerability scans
- Customer-led security assessments
- Ongoing RABET‑V verification
3. Implementation
- Secure configurations tailored to election offices
- Optional API automation with full audit trails
- Training and documentation to comply with state and federal regulations
How We Protect Systems & Data
Feature | How It Strengthens Election Security |
---|---|
Data Encryption | Encrypted in transit & at rest to prevent unauthorized access. |
Audit Logging | Detailed logs of user activity and data flows for full traceability. |
Hardened Infrastructure | Securely configured platforms reduce vulnerabilities. |
Secure Integrations | APIs and third‑party tools are tested to compliance standards. |
Security Monitoring | Internal reviews, audits, and penetration tests keep threats at bay. |
Stronger Together: Collaboration & Transparency
- Center for Internet Security (CIS)
- The Turnout (RABET‑V Administrator)
- U.S. Election Assistance Commission (EAC)
- Cybersecurity & Infrastructure Security Agency (CISA)
- Center for Civic Design
We welcome collaboration with security researchers, election officials, and transparency advocates to promote vulnerability disclosure, reporting, and public education.
Vulnerability Disclosure Program
If you’re a security researcher evaluating our systems, please contact Security@EnhancedVoting.com.