Schemat blokowy

AMODIT Security

Ensuring the security of your data is our priority.

Free consultation

How do we do it?

We have a team of experts who ensure that our strict security and privacy standards are maintained. Our internal policies help us remain compliant with industry standards and requirements.

Data Hosting

Microsoft

The Microsoft Azure infrastructure is hosted and managed in their secure data centers. Astrafox leverages the built-in security, redundancy, and privacy features of the platform. Microsoft continuously monitors the data centers for security, performance, and compliance with industry standards. We develop our solutions on a platform built with some of the most stringent security and compliance standards in the world, conforming to: ISO 27001, ISO 27018, SOC 1, SOC 2, SOC 3, FedRAMP, HITRUST, MTCS, IRAP, and ENS.

Encryption

Data passing through Astrafox is encrypted during transmission; all connections from the user’s device to the Amodit platform are encrypted using TLS SHA-256 with RSA encryption. We require the HTTPS protocol for all communication. We use HSTS to ensure that computers communicate with our servers exclusively using the HTTPS protocol across all web browsers.

Security

See how we ensure data security.

Confidentiality

All employees sign a confidentiality agreement when entering into an employment contract.

Trening

We limit internal access to data strictly necessary for job performance and train employees on data handling and security to ensure the protection and privacy of your information.

Reliability and Redundancy

Our systems rely on geographically distributed, redundant web servers and live-replicated databases to ensure high availability. We also have effective disaster recovery plans in place to ensure business continuity using daily backups.

AMODIT security statement

Software Development

Audit

We scan our services for outages, performance degradation, and security vulnerabilities. Our engineers take immediate action upon detecting incidents.

Software Versioning

Our software development process operates in three stages: development, testing, and production. We thoroughly test our software to ensure high quality and user convenience.

All new versions are tested by our testing department in both the development and testing phases. We provide separate testing servers for our internal development and for clients who require them. We also test our software during the live testing phase, as our internal service runs on it, allowing us to detect and fix emerging issues more quickly.

Software Quality

Once changes to the software are completed, the code is reviewed by senior members of our development team.

Vulnerability control

See how we ensure vulnerability control.

Mobile Device Security

We secure our employees’ computers using industry-leading anti-malware and antivirus software, controlling user rights, and enforcing data encryption.

Vulnerability Testing

We regularly check and update our systems with the latest security patches. We also use security mailing lists and automatically scan our code for vulnerabilities.

Application security

Login Protection

As we need to collect your passwords, we heavily encrypt them using one-way encryption. We can also provide two-factor authentication using widely accepted third-party solutions.

Schedule a free consultation

with one of our specialists. We will show you step by step how to effectively optimize processes in your company using AMODIT.

    The administrator of the personal data provided via the above contact form is Astrafox sp. z o.o., headquartered in Warsaw. Personal data will be processed in order to respond to the submitted message. You have the right to access your data, request its correction, restriction, deletion, objection, and to lodge a complaint with the supervisory authority. Detailed information on the processing of the provided personal data can be found in the Privacy Policy.