Scroll export button | ||||||||
---|---|---|---|---|---|---|---|---|
|
Info |
---|
This document provides information on built-in security features of the Wildix system and Wildix services description. Updated: December 2022 Permalink: https://wildix.atlassian.net/wiki/x/vQFmBQ |
Security is a top priority for Wildix and all the security features are built-in inside the product, which means the Wildix System is Secure By Design.
...
Wildix makes reasonable efforts to prevent cookie/session leaks, such as centralized CSRF protection and similar proactive measures.
4. Storage of data at rest
Data stored in the Cloud is encrypted by default. Data stored on local hardware or on virtual machines can be encrypted depending on the client's infrastructure.
...
. Implementation of best practices to avoid security risks
Wildix follows OWASP recommended practices, performs penetration testing and educates employees. More details can be provided after signing an NDA.
65. Mitigations Against CPU Speculative Execution Attack Methods
...
Hosting services description
1. Data location:
Closest AWS location to each office You have possibility to choose the desired location
2. Security policy and tools:
...
Back-ups may be performed manually or scheduled at regular intervals by the end-user or the Wildix Partner (not performed by Wildix).
5. Disaster Recovery Plan (DRP) description, recovery time objective (RTO) and recovery point objective (RPO):
...