Security & Compliance

The Safestar cloud is secure thanks to the use of multiple layers of security that protect both infrastructure and user data

We provide security on many levels

Physical security

We place servers and receiving devices in unique server rooms that meet strict security standards. Safestar infrastructure is located in 2 server rooms in the European Union to protect data during accidental events such as fire. Thanks to this, data is safe, and any event will not cause data loss or system downtime for a long time.

Cybersecurity

We protect the system and user data from threats in many layers. We use the full potential of AWS cloud professionals and are continuously working on our application security. Data and passwords are encrypted, which increases the level of protection.

Disaster Recovery

We create backups – each data backup is an additional safeguard. The Safestar system automatically copies the data daily, so you don’t have to remember to do it. However, users can make extra copies of the data anytime – they need to use the data export function. They can download the data to their computer’s disk.

Standards & Procedures

We have implemented internal procedures regulating the principles of access to infrastructure, collected data and performed programming work. We have collected them in our Information Security Management System ISO 27001. The procedures also take into account the principles of processing personal data in order to meet the requirements of the GDPR and NIS2 regulations.

User Internal Security

2FA

A two-step login provides an even higher level of security. It consists of confirming the identity of the user logging into the system using another device, e.g. SMS or token.

IP Filtering

IP filtering allows users to log into the system only from a device associated with a specific IP address. Only employees using particular devices and locations have access to the Safestar system.

ACL

The Safestar system allows you to create different user profiles and assign them the appropriate permissions necessary to perform their duties. This solution makes controlling employee access to specific modules, groups of objects or system functionalities easier.

Password Strength

The basis for secure access to any IT system is a password. Safestar automatically controls the strength of the password being set. To ensure peace of mind, the password should be strong enough. It is best if it consists of a series of letters, numbers and special characters.

GDPR

TOM

In order to ensure the security of data transmission, we provide standard technical and organizational measures appropriate to the level of risk to the security of the services offered.

Transmission encryption

The transmission of customer data from the system to the Customer’s end device is encrypted using protocols securing the transmission of data streams (Secure Socket Layer or other similar).

Data encryption

The System uses selected cryptographic security techniques in relation to selected Customer data or access data to the System (Administrator and End User passwords).

Backup copies

In order to secure customer data entered into the System or other data stored in the System databases, backup copies are created

NIS 2 Compliance

ISO 27001

In order to ensure the security of data transmission, we provide standard technical and organizational measures appropriate to the level of risk to the security of the services provided.

Risk analysis

The transmission of customer data from the system to the Customer’s end device is encrypted using protocols securing the transmission of data streams (Secure Socket Layer or other similar).

SOC

The System uses selected cryptographic security techniques in relation to customer chosen data or access data to the System (Administrator and End User passwords).

Business continuity

In order to secure customer data entered into the System or other data stored in the System databases, backup copies are created

Do you have more questions?

Don’t hesitate to ask us about security.

Scroll to Top