Security

Our Holistic Security Approach
In order to reduce security risks to minimum, a holistic approach to security is required. Our security processes are born out of a clear definition of the threats to our system.
Security threats are a result of the various interaction points that an application provides to the external world, and the various users that can interact with these interfaces. For instance Your Customers, Your Resellers, Your staff, Our Staff, Anonymous Internet Users and Third Party Servers are interacting with our Systems at any given point of time. Each of these actors need to have different access levels and different rights and permissions.
 
Security Goal
Privacy - Information within our infrastructure and systems will only be accessible by authorized users
Integrity - Data and information within our infrastructure cannot be tampered with by any unauthorized user
Data Protection - Data within the systems cannot be harmed, deleted or destroyed
Identification and Authentication - Ensures that any user of the system is who he claims to be and eliminates chances of impersonation
Network Service Protection - Ensures that networking equipment is protected from malicious hacking attempts or attacks that threaten uptime
 
Back