A Successful 15+ Years in Joint-Venture

In 2024 we celebrate a milestone 15-year joint venture with the global share registry super-power, Computershare Group Limited.

We have collaborated successfully on more than 1,000 corporate transactions since the joint venture started. Reach has brought Computershare high value on-demand digital services for its corporate transaction clients, and we have been able to scale our business globally as a result of this incredible partnership.

Corporate transaction clients of Computershare can request the support of our digital services through their representatives by mentioning Reach. Reach can also connect Deal Teams to the right Computershare contacts to begin setting up a successful transaction.

Our People

Our in-house experts and product specialists are supported by our experienced board and management team.

Executive Team

The Reach Agency Executive Team - Ann Bowering The Reach Agency Executive Team - Ann Bowering

Ann Bowering

Non-Executive Director

The Reach Agency Executive Team - Simon Clatworthy The Reach Agency Executive Team - Simon Clatworthy

Simon Clatworthy

Independent Director

The Reach Agency Executive Team - Calvin Rowley The Reach Agency Executive Team - Calvin Rowley

Calvin Rowley

Chief Executive Officer

Management Team

The Reach Agency Management Team - Lee Parsons The Reach Agency Management Team - Lee Parsons

Lee Parsons

Chief Operations Officer

The Reach Agency Management Team - Matthew Wanders The Reach Agency Management Team - Matthew Wanders

Matthew Wanders

Head of Technology

When advising clients to go digital, having the answers to security questions is critical.

Refer to the section below for content profiling Reach's security protocols, our certification, and details of the security-related services we can extend to clients.

Security & Certification

Our websites and underlying platform have processed millions of applications worth many billions of dollars. A cornerstone of the Reach culture is our adherence to best practice governance, security and processes.

SOC 2 Certified Logo

SOC 2 Certified

Reach implements the Trust Services Criteria for Security, Availability, Processing Integrity and Confidentially from the SOC2 audit standard and is validated annually by an external, AICPA registered, audit agent.

CyberCX Logo

Independent Penetration Testing

CyberCX is the leading provider of professional cyber security and cloud services across Australia and New Zealand. Reach leverages CyberCX’s service to conduct application penetration testing.

Center for Internet Security Logo

CIS Server Hardening Benchmarks

Reach subscribes to and implements server hardening protocols as published and maintained by the Center for Internet Security to ensure Reach's infrastructure meets or exceeds configuration standards for best practise security.

AWS Logo AWS Shield Logo

AWS Shield DDoS Attack Mitigation

Reach uses the full suite of AWS security tools, including AWS Shield, that provides Distributed Denial of Service (DDoS) detection and automatic inline mitigations that minimize application downtime.

AWS Logo Amazon GuardDuty Logo

Threat Detection and Monitoring

Reach uses the full suite of AWS security tools, including AWS GuardDuty that continuously monitors for malicious activity and unauthorized behaviour to protect accounts, workloads, and data.

AWS Logo AWS Security Hub Logo

AWS Environment Security

AWS Security Hub provides you with a comprehensive view of your security state in AWS and helps you assess your AWS environment against security industry standards and best practices. Reach leverages Security Hub to monitor compliance with the CIS AWS Foundation Benchmark.

AWS Logo AWS Config Logo

AWS Resource Monitoring

AWS Config provides a detailed view of the configuration of AWS resources in your AWS account. This includes how the resources are related to one another and how they were configured in the past so that you can see how the configurations and relationships change over time. Reach leverages Config to monitor configuration changes, enforce best practice rules and monitor compliance.

AWS Logo AWS Inspector Logo

Workload Vulnerability Scanning

Amazon Inspector is a vulnerability management service that automatically discovers workloads and continually scans them for software vulnerabilities and unintended network exposure. Reach leverages Inspector to monitor hosts of vulnerabilities and validate mitigations.

AWS Logo AWS WAF Logo

Web Application Firewall

AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to your protected web application resources. Reach leverages AWS WAF to protect all Internet facing websites and resources.

Qualys Logo

Surface Scanning

Reach regularly carries out scans of the Reach portals to ensure that SSL and Header support are properly configured at all times.

 Logo

OWASP Secure Coding Standards

Reach coding standards include mitigations for the OWASP Top10 software coding vulnerabilities.

New Relic Logo

System Performance Monitoring

In addition to AWS system tools, Reach deploys New Relic active system monitoring tools to track performance and capacity of all active services and equipment. Breach thresholds are alerted automatically to the Reach engineers to remedy before system errors.

Bucket AV Logo

Virus Protection

BucketAV is an open-source antivirus engine to detect trojans, viruses, and malware. Reach leverages BucketAV to provide anti-malware protection for file upload handling within its application platform stack.

Encryption Logo

Encryption

All Personal Identification Information (PII) data is encrypted at all times. We use 256-bit encryption for all data at rest and 2048-bit private keys for site connections.

Data Sovereignty Logo

Data Sovereignty

Reach ensures data sovereignty by setting up servers in each jurisdiction. At no time will data leave the client's jurisdiction.

Currently Reach has self-contained and quarantined infrastructure in USA, Australia, UK, Canada, Hong Kong, Singapore and EU.

GDPR Logo

Global Data Privacy Regulation Compliance

Reach can comply with international privacy regulations as may be required for each project’s jurisdiction. This includes GDPR, CCPA, and Australia’s Data Privacy Act.

Git Logo

Software Development Lifecycle Management

Reach uses Git hosted on Microsoft Azure for source code management and control; version control and rollback; and branching.