SECURITY
Security is not an option, it’s our priority.
For us at SEECURA, security is not an option but an absolute priority and an essential component of our platform at all levels. Seecura entrusts all data to a Server with IaaS and IDS firewalls, as well as integrated security measures up to the login page.
As sensitive data is stored, shared, and transmitted through our app, we consider security an integral part of our operations. This includes regular app and operating system updates and implementing 2FA logins for all users.
The application does not hold any data. Seecura collects users’ orders and immediately transmits them using an HTTPS protocol (HyperText Transfer Protocol over Secure Socket Layer) to the final destination server. This guarantees our users that, in the event of unauthorized access to the app, their information will not be visible in any way — simply because it is not there!
In other words, anyone who manages to access a phone and enter the Seecura app illegally will only see a list of final wishes without any content.
For this reason, Seecura doesn’t allow remote access to any entrusted information or documents, not even by its owner.
Final wishes cannot be recovered once submitted. Users must cancel and resubmit to amend or review them.
Where are the final wishes stored?
All data is stored in a cloud, in turn, protected within a server with the highest level of safe and anti-intrusion systems.
SEECURA'S CLOUD
SEECURA guarantees the highest security standard.
Our cloud guarantees the highest security standards for protecting stored information and against intrusion. Specifically:
Firewall
Each server used by Seecura is equipped with a firewall that allows access only to specific ports necessary for application operation.
Access security
For our users, throttling SSH and SFTP logins is a simple but effective method of dealing with brute-force logon attacks.
Bot protection
Database protection
Application isolation
SSL certificates
User role management
Operating system security and patching
Compliance with GDPR
Two-factor authentication
End-to-end encryption
Access control for suspicious devices
There is a control system for all devices that try to access a user’s account. If a device or login attempt is marked as Suspicious, the user is notified by email, the login process is aborted, and appropriate actions are taken to verify identity.