Celebrating 15+ Years of Success in Joint Venture

In 2024, we marked a significant milestone—15 years of a successful joint venture with global share registry leader, Computershare Group Limited.

Since the beginning of our partnership, we've collaborated on over 1,200 corporate transactions, delivering high-value, on-demand digital services to Computershare's corporate clients. This powerful alliance has enabled Reach to expand globally, supporting complex transactions with innovative, scalable solutions.

Computershare clients can request Reach's digital services directly through their representative by mentioning Reach. Alternatively, Reach can connect Deal Teams with the appropriate Computershare contacts to initiate a seamless transaction setup.

Our People

Behind every successful project is our team of experts and product specialists—guided by a seasoned board and experienced leadership team.

Executive Team

The Reach Agency Executive Team - Ann Bowering The Reach Agency Executive Team - Ann Bowering

Ann Bowering

Non-Executive Director

The Reach Agency Executive Team - Simon Clatworthy The Reach Agency Executive Team - Simon Clatworthy

Simon Clatworthy

Independent Director

The Reach Agency Executive Team - Calvin Rowley The Reach Agency Executive Team - Calvin Rowley

Calvin Rowley

Chief Executive Officer

Management Team

The Reach Agency Management Team - Lee Parsons The Reach Agency Management Team - Lee Parsons

Lee Parsons

Chief Operations Officer

The Reach Agency Management Team - Matthew Wanders The Reach Agency Management Team - Matthew Wanders

Matthew Wanders

Head of Technology

Security Matters

When advising clients to go digital, having clear, confident answers to security questions is essential.

Refer to the section below for a detailed overview of Reach’s security protocols, certifications, and the security-focused services we offer to support your digital transformation.

Security & Certification

Our platforms have processed millions of secure applications worth billions. Governance, security, and best practices are at the heart of everything we do.

SOC 2 Certified Logo

SOC 2 Certified

Reach implements the Trust Services Criteria for Security, Availability, Processing Integrity and Confidentially from the SOC2 audit standard and is validated annually by an external, AICPA registered, audit agent.

CyberCX Logo

Independent Penetration Testing

CyberCX is the leading provider of professional cyber security and cloud services across Australia and New Zealand. Reach leverages CyberCX's service to conduct application penetration testing.

Center for Internet Security Logo

CIS Server Hardening Benchmarks

Reach subscribes to and implements server hardening protocols as published and maintained by the Center for Internet Security to ensure Reach's infrastructure meets or exceeds configuration standards for best practise security.

AWS Logo AWS Shield Logo

AWS Shield DDoS Attack Mitigation

Reach uses the full suite of AWS security tools, including AWS Shield, that provides Distributed Denial of Service (DDoS) detection and automatic inline mitigations that minimize application downtime.

AWS Logo Amazon GuardDuty Logo

Threat Detection and Monitoring

Reach uses the full suite of AWS security tools, including AWS GuardDuty that continuously monitors for malicious activity and unauthorized behaviour to protect accounts, workloads, and data.

AWS Logo AWS Security Hub Logo

AWS Environment Security

AWS Security Hub provides you with a comprehensive view of your security state in AWS and helps you assess your AWS environment against security industry standards and best practices. Reach leverages Security Hub to monitor compliance with the CIS AWS Foundation Benchmark.

AWS Logo AWS Config Logo

AWS Resource Monitoring

AWS Config provides a detailed view of the configuration of AWS resources in your AWS account. This includes how the resources are related to one another and how they were configured in the past so that you can see how the configurations and relationships change over time. Reach leverages Config to monitor configuration changes, enforce best practice rules and monitor compliance.

AWS Logo AWS Inspector Logo

Workload Vulnerability Scanning

Amazon Inspector is a vulnerability management service that automatically discovers workloads and continually scans them for software vulnerabilities and unintended network exposure. Reach leverages Inspector to monitor hosts of vulnerabilities and validate mitigations.

AWS Logo AWS WAF Logo

Web Application Firewall

AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to your protected web application resources. Reach leverages AWS WAF to protect all Internet facing websites and resources.

Qualys Logo

Surface Scanning

Reach regularly carries out scans of the Reach portals to ensure that SSL and Header support are properly configured at all times.

 Logo

OWASP Secure Coding Standards

Reach coding standards include mitigations for the OWASP Top10 software coding vulnerabilities.

New Relic Logo

System Performance Monitoring

In addition to AWS system tools, Reach deploys New Relic active system monitoring tools to track performance and capacity of all active services and equipment. Breach thresholds are alerted automatically to the Reach engineers to remedy before system errors.

Bucket AV Logo

Virus Protection

BucketAV is an open-source antivirus engine to detect trojans, viruses, and malware. Reach leverages BucketAV to provide anti-malware protection for file upload handling within its application platform stack.

Encryption Logo

Encryption

All Personal Identification Information (PII) data is encrypted at all times. We use 256-bit encryption for all data at rest and 2048-bit private keys for site connections.

Data Sovereignty Logo

Data Sovereignty

Reach ensures data sovereignty by setting up servers in each jurisdiction. At no time will data leave the client's jurisdiction.

Currently Reach has self-contained and quarantined infrastructure in USA, Australia, UK, Canada, Hong Kong, Singapore and EU.

GDPR Logo

Global Data Privacy Regulation Compliance

Reach can comply with international privacy regulations as may be required for each project's jurisdiction. This includes GDPR, CCPA, and Australia's Data Privacy Act.

Git Logo

Software Development Lifecycle Management

Reach uses Git hosted on Microsoft Azure for source code management and control; version control and rollback; and branching.

Get in Touch

If you would like to speak directly with a member of the Reach team about our services, please don't hesitate to contact us. We'll respond promptly.

A Globally Trusted Leader in Digital Solutions for Deal Teams

We equip deal teams with innovative, end-to-end technology that simplifies complex transactions, enhances efficiency, and ensures seamless execution throughout the entire deal lifecycle.