Encryption
We use symmetric and asymmetric encryption to protect our systems. Access to the keys is only possible for authorized employees.
Security standards
We use symmetric and asymmetric encryption to protect our systems. Access to the keys is only possible for authorized employees.
Our hosting service provider, based in Germany, ensure protection against downtime with high-availability power supply and fire protection.
We use failover solutions to switch to a standby solution at any time and maintain operations in the event of a failure of the productive system.
Regular security audits are performed by internal staff as well as by external security companies to ensure the resilience of the systems.