Security Features
Our solutions incorporate advanced security features including robust encryption, 2FA authentication, role-based access and more.
Account Safeguards
Distributed Denial-of-Service (DDoS) Protection
DDoS attacks are mitigated through the use of third-party cloud-based protections services such firewalls for perimeter protection. Threat detection systems are also in place to alert users when abnormal activities are detected.
Multi-factor Authentication
We provide multi-factor authentication as an additional layer of security, reducing the risk of intruders gaining access to critical systems and important data.
Industry-Standard Identity Management
We utilise the latest available authentication technology without compromising our exposure of personally identifiable information to external systems. Our products are able to extend into serverless architectures through the use of messaging services, Lambda functions and containers for peripheral services.
User IP Address Whitelisting
We provide our clients the ability to whitelist IP addresses, preventing hackers from entering production servers through unapproved networks.
Data Encryption
Trusted & Secure Encrypted Connection
Data transmissions to our servers are secured using TLS 1.3 HTTP encryption, to ensure speed and privacy.
Encrypted Data Pipeline and Data at Rest
We provide for encryption of data at both database and field level for added security and anonymity. Data passed between our modules via the Internet is encrypted by SSL.
Strong Password Hashing Encryption
Passwords in our database are secured by strong password hashing functions, either through PBKDF2 or SHA encryption.
Reporting & Alerts
Regular Reporting & Alerts
We generate threat reports and log analytics reports to ensure that our systems are secure and healthy within serivce level timeframes. We can also deploy automated security monitoring and intrusion detection.
Key Access & Audit Trail
Detailed audit logs of backend requests are stored in separate servers to log organisation’s personnel access to sensitive information on back-end database.
Request a demo
To learn more about how HydraX’s solutions can help your business, contact us for a free demo.
Hydra X may also contact you regarding our products and services as well as the latest industry insights. You can opt-out of our communications at any time.