Security and reliability
This is how we take care of your data
According to our philosophy, custom software development is not only a professional matter, but also a matter of trust to a significant extent. As developers, we sometimes come into possession of important business secrets, which we must take care of just as carefully as we take care of our own.

Security is a requirement that most people only pay attention to when it is too late. Based on our many years of experience, we know this exactly, which is why we design our systems from the very beginning to be secure in every respect.

Of course, security can only be provided by a reliable company. So the most important requirement is reliability itself. All other aspects can only come into question after that.
In the case of software, security covers three different areas:
  • Security of stored data

  • Security of data access

  • Security of the operating environment
Security of stored data
Nowadays, the security of stored data is best ensured by using a robust and configurable database server program. Such a system, supplemented with periodic and/or manually controlled backups, can provide the highest data security available today.
Data access security
Data access security is a much more complex issue. The database connection systems we develop, as part of the FMT technology, ensure data access security with comprehensive authorization management. The most important features of this are:
  • Individual and group authorization management, without the need for external support.
  • Three types of authorizations, which ensure that everyone can only access what they have the right to:
    • Write right
    • Read right
    • Function right

  • The storage time and user ID are stored for all stored sensitive data.
Special data access rights
Data access permissions are typically tied to the type of data. This is typically implemented by most systems.

However, the FMT technology we use also allows us to provide users with access based on the data content. This means that not only can you specify what type of data someone can access, but also that within that data, only those that can be classified into certain categories based on their content.
 
Safety of the operating environment
The security of the operating environment depends on many things. We are aware that as users you are often unaware of these issues, therefore, during our first meeting, we try to provide our customers with all the information they may need to make the right decisions.
See also:

IT Compass

If you don't know where to go.
More

Walk the Walk

Talking is easy.
More

Good to know

Because knowledge is power.
More

Copyright © FutureSoft Informatics