Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Scroll export button
scopecurrent
template-id0fa09813-8b86-460a-aa1d-ef450a80e9ce
quick-starttrue
add-onScroll PDF Exporter

Info

This document provides information on built-in security features of the Wildix system and Wildix services description.

Updated: December 2022

Permalink: https://wildix.atlassian.net/wiki/x/vQFmBQ

Security is a top priority for Wildix and all the security features are built-in inside the product, which means the Wildix System is Secure By Design.

...

Wildix makes reasonable efforts to prevent cookie/session leaks, such as centralized CSRF protection and similar proactive measures.

4. Storage of data at rest

Data stored in the Cloud is encrypted by default. Data stored on local hardware or on virtual machines can be encrypted depending on the client's infrastructure.

...

. Implementation of best practices to avoid security risks 

Wildix follows OWASP recommended practices, performs penetration testing and educates employees. More details can be provided after signing an NDA.

65. Mitigations Against CPU Speculative Execution Attack Methods

...

Hosting services description

1. Data location:

Closest AWS location to each office You have possibility to choose the desired location

2. Security policy and tools:

...

Back-ups may be performed manually or scheduled at regular intervals by the end-user or the Wildix Partner (not performed by Wildix).

5. Disaster Recovery Plan (DRP) description, recovery time objective (RTO) and recovery point objective (RPO):

...