Security & Compliance
We pay special attention to security. Already during the design phase of each solution and feature, we take into consideration questions related to data security and security of processes performed by the system.
We implement our own original technology, which we subject to meticulous testing. We don't use ready-made components, since all features of iPresso are developed by our company. This gives us complete control over source code, processes, resources and operating logic of all the parts of the system.
The following audits are systematically conducted:
keyboard_arrow_rightData security management
keyboard_arrow_rightService quality management
keyboard_arrow_rightCompliance with the norms in force
Designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm; Involves the use of multiple layers of interdependent systems which include CCTV surveillance, security guards, protective barriers, locks, access control protocols.
Consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources; involves the authorization of access to data in a network, which is controlled by the network administrator.