Data security

Data Security

  • Site on Virtual private Server on a cloud (AWS)
  • Access to the application using appropriate credentials
  • Application validates the user details/credentials
  • Role based access control
  • VeriSign Certificates
  • SSL encryption
  • Sensitive Data are encrypted
  • PCI DSS certified Payment Gateway (CC Avenue)
  • 24 * 7 monitoring of access
  • Logs of activities are maintained
  • Malware detection mechanisms are active
  • Access to artefacts are based on need with appropriate approvals
  • Backup mechanisms in place. Replicated every 1 hour
Back to top