Tech & security overview

High-level description of how Queast processes and delivers sales signals for IT vendors.

Data flow

1

Ingestion

  • Collect public IT job ads from selected markets.
  • Normalise formats, detect language and translate where necessary.
2

Tagging

  • Apply a custom technology and role taxonomy.
  • Add high-level tags such as project pains and department buildouts.
3

Enrichment

  • Enrich companies with sector, size, website and basic tech stack hints.
  • Enrich contacts where available using third-party providers and web search.
4

Scoring & matching

  • Apply tenant-specific scoring rules.
  • Only surface signals that exceed agreed thresholds.
5

Delivery

  • Queast web portal.
  • Email digests and alerts.
  • Slack notifications; optional API access for advanced users.

Multi-tenancy

  • its own rules and preferences,
  • its own favourites, blacklists and feedback,
  • no visibility into other tenants’ data.

Security notes

  • All access via HTTPS.
  • Role-based access inside each tenant.
  • Infrastructure and dependencies are kept up to date with security patches.
  • Data is limited to what is needed for signal generation and enrichment.

For deeper security details we can provide a separate technical dossier under NDA.