Tech & security overview
High-level description of how Queast processes and delivers sales signals for IT vendors.
Data flow
1
Ingestion
- Collect public IT job ads from selected markets.
- Normalise formats, detect language and translate where necessary.
2
Tagging
- Apply a custom technology and role taxonomy.
- Add high-level tags such as project pains and department buildouts.
3
Enrichment
- Enrich companies with sector, size, website and basic tech stack hints.
- Enrich contacts where available using third-party providers and web search.
4
Scoring & matching
- Apply tenant-specific scoring rules.
- Only surface signals that exceed agreed thresholds.
5
Delivery
- Queast web portal.
- Email digests and alerts.
- Slack notifications; optional API access for advanced users.
Multi-tenancy
- its own rules and preferences,
- its own favourites, blacklists and feedback,
- no visibility into other tenants’ data.
Security notes
- All access via HTTPS.
- Role-based access inside each tenant.
- Infrastructure and dependencies are kept up to date with security patches.
- Data is limited to what is needed for signal generation and enrichment.
For deeper security details we can provide a separate technical dossier under NDA.