Schemat blokowy

AMODIT Security

Ensuring Your Data Security is Our Priority.

Free Consultation

How Do We do it?

Our dedicated team of experts upholds strict security and privacy standards, ensuring compliance with industry requirements. Through our internal policies we maintain the highest levels of data protection.

Data Hosting

Microsoft

Our solutions are built on Microsoft Azure, a platform hosted and managed in secure data centers. Astrafox leverages the built-in security, redundancy, and privacy features of the platform. Microsoft continuously monitors these centers for security, performance, and compliance with industry standards. The platform built adheres to some of the most stringent security certifications, including: ISO 27001, ISO 27018, SOC 1, SOC 2, SOC 3, FedRAMP, HITRUST, MTCS, IRAP, and ENS.

Encryption

All data transmitted through Astrafox is encrypted, ensuring the highest level of security. Connections between the user’s device and the AMODIT platform are secured using TLS SHA-256 with RSA encryption. We enforce HTTPS for all communications and implement HSTS to guarantee browsers only communicate with our servers through HTTPS.

Security

Learn more about our comprehensive security measures.

Confidentiality

All employees sign confidentiality agreements upon hiring, ensuring your data remains protected.

Training

We limit internal access to data to only what is necessary for job performance. Our employees receive thorough training on data handling and security practices, ensuring the utmost protection of your information.

Reliability and Redundancy

Our systems are built for high availability, relying on geographically distributed, redundant web servers and live-replicated databases. We ensure business continuity with daily backups and robust disaster recovery plans.

AMODIT security Statement

Software Development

Audit

We continuously scan our services for outages, performance issues, and security vulnerabilities. Our engineering team takes immediate action when incidents are detected to ensure uninterrupted service and protection.

Software Versioning

Our development process follows a structural approach with three stages: development, testing, and production. Each software version undergoes rigorous testing by our dedicated team, ensuring high performance and user convenience.

Testing is conducted in both development and testing environments, including internal servers and those made available for clients. By running our internal services on the live version of our software, we can quickly identify and resolve any emerging issues.

Software Quality

All software changes are carefully reviewed by senior developers to maintain the highest standards of code quality and performance.

Vulnerability control

We take proactive measures to address security vulnerabilities. Learn more about how we manage vulnerabilities.

Mobile Device Security

We secure our employees’ computers with advanced anti-malware and antivirus solutions, enforce strict user access controls, and apply encryption protocols to safeguard data.

Vulnerability Testing

Our systems are regularly updated with the latest security patches. We also use security mailing lists and automated tools to scan our code for potential vulnerabilities, ensuring robust protection.

Application security

Login Protection

We safeguard login credentials by encrypting passwords using one-way encryption. We also offer two-factor authentication using trusted third-party providers for enhanced account security.

Schedule a free consultation

with one of our specialists to discover how AMODIT can help optimize and secure your business processes.

    The Controller of the personal data provided via the above contact form is Astrafox sp. z o.o., headquartered in Warsaw. Your personal data will be processed to respond to your inquiry. You have the right to access, correct, restrict, delete, object to the processing of your data, as well as the right to lodge a complaint with the supervisory authority. For more details on how your personal data is handled, please refer to our Privacy Policy.