Support & Downloads

Quisque actraqum nunc no dolor sit ametaugue dolor. Lorem ipsum dolor sit amet, consyect etur adipiscing elit.

s f

Contact Info
198 West 21th Street, Suite 721
New York, NY 10010
foton@qodeinteractive.com
+88 (0) 101 0000 000
Follow Us
s

Security

Our security experts detect and neutralize threats faster than anyone else.

Network Setup

Our systems and security team perform regular updates to all company systems and can respond quickly to any major vulnerability by applying patches. The company’s servers are also hardened using recommended guidelines to increase system security.

b
h13 rev img 4 3

Firewalls and IDS

Fibantech security system includes firewalls with both an Intrusion Detection System and an Intrusion Prevention System to protect against both active and passive threats. The systems monitor network traffic and look for any unusual behavior, abnormal traffic, or malicious coding and prevent exploitation of any potential vulnerabilities.

System Updates

The servers and networks appliances are regularly updated to ensure all software is up to date. If a major vulnerability is discovered, patches are applied immediately by Fibantech’s system and security team. Per our compliance, all updates are logged as part of our change-control policies.

system

Fibantech Security Features

Authentication & Access Controls

This includes the requirement for VPN to all internal systems, controlled definitions of user roles, and the requirement of multi-factor authentication.

x

Data Storage

Our database server architecture ensures up time and load balancing of database servers. Sensitive cardholder data is stored for up to 24 months of inactivity.

j

Daily Backups

Databases are automatically backed up daily to protect merchants against lost, corrupted, stolen or destroyed data.

h
g

Password Protection

Software settings controlled by Fibantech ensure that passwords are always complex in nature, changed regularly, hashed and that users cannot re-use their previous 13 passwords.

a

Physical Data Access

Physical access to environments are limited to key personnel, with multi-factor authentication, including biometrics.

d

Deny-All Policies

Firewalls deployed to our server environments have deny-all policies enabled by default.

fibantech 2

Transform your business with a custom web app in weeks not months