AMODIT Security
Ensuring the security of your data is our priority.
How do we do it?
We have a team of experts who ensure that our strict security and privacy standards are maintained. Our internal policies help us remain compliant with industry standards and requirements.
Data Hosting
Microsoft
The Microsoft Azure infrastructure is hosted and managed in their secure data centers. Astrafox leverages the built-in security, redundancy, and privacy features of the platform. Microsoft continuously monitors the data centers for security, performance, and compliance with industry standards. We develop our solutions on a platform built with some of the most stringent security and compliance standards in the world, conforming to: ISO 27001, ISO 27018, SOC 1, SOC 2, SOC 3, FedRAMP, HITRUST, MTCS, IRAP, and ENS.
Encryption
Data passing through Astrafox is encrypted during transmission; all connections from the user’s device to the Amodit platform are encrypted using TLS SHA-256 with RSA encryption. We require the HTTPS protocol for all communication. We use HSTS to ensure that computers communicate with our servers exclusively using the HTTPS protocol across all web browsers.
Security
See how we ensure data security.
Confidentiality
All employees sign a confidentiality agreement when entering into an employment contract.
Trening
We limit internal access to data strictly necessary for job performance and train employees on data handling and security to ensure the protection and privacy of your information.
Reliability and Redundancy
Our systems rely on geographically distributed, redundant web servers and live-replicated databases to ensure high availability. We also have effective disaster recovery plans in place to ensure business continuity using daily backups.
AMODIT security statement
Software Development
Audit
We scan our services for outages, performance degradation, and security vulnerabilities. Our engineers take immediate action upon detecting incidents.
Software Versioning
Our software development process operates in three stages: development, testing, and production. We thoroughly test our software to ensure high quality and user convenience.
All new versions are tested by our testing department in both the development and testing phases. We provide separate testing servers for our internal development and for clients who require them. We also test our software during the live testing phase, as our internal service runs on it, allowing us to detect and fix emerging issues more quickly.
Software Quality
Once changes to the software are completed, the code is reviewed by senior members of our development team.
Vulnerability control
See how we ensure vulnerability control.
Mobile Device Security
We secure our employees’ computers using industry-leading anti-malware and antivirus software, controlling user rights, and enforcing data encryption.
Vulnerability Testing
We regularly check and update our systems with the latest security patches. We also use security mailing lists and automatically scan our code for vulnerabilities.
Application security
Login Protection
As we need to collect your passwords, we heavily encrypt them using one-way encryption. We can also provide two-factor authentication using widely accepted third-party solutions.
Schedule a free consultation
with one of our specialists. We will show you step by step how to effectively optimize processes in your company using AMODIT.
What areas can you improve
IN YOUR COMPANY?
Legal
Area
Optimize the work of the legal department – organize contracts and annexes in one system and provide the team with convenient access to information.
Financial
Area
Automate financial processes and avoid errors resulting from manual tasks.
HR
Area
Store all employee data in one place through the automation of HR processes.
Administrative
Area
Minimize delays, errors, or lost documents by automating processes in the administrative area.
IT
Area
Streamline the work of the IT department with easy monitoring of projects at every stage.