Data transmission and communication security
The entire communication between MetaKocka users and the server is secured with a safe SSL connection that is protected from unauthorized eavesdropping with 256-bite encryption. Furthermore, we responsibly take care of regularly updating the settings for safe connections and validating them ssllabs.com web shop.
Security of server, data center, and infrastructure
After a thorough assessment, MetaKocka company selected Amazon for renting production servers, since Amazon is the globally recognized provider of such services both in terms of security as well as operational stability. AWS services, which are offered by Amazon in their product portfolio, are the most technologically advanced services that ensure the operation of so-called SaaS (Software as a service) products such as MetaKocka. Aside from active security preventing intrusions, attacks, and physical access to data, Amazon has multi:
- Certification ISO 27001* is a system monitoring data security (also known as Information Security Management System).
- ISO 27001 is a globally recognized security standard that determines requirements and execution of best practices as well as systematization of access to manage the company and user data based on the regular estimations of risk. To acquire the certification, the company must prove to have a systematic approach to overcoming risks related to information security that impact the confidentiality, integrity, and availability of the company and the customer.
- Compliance with Level 1 of the “Payment Card Industry (PCI) Data Security Standard (DSS)’’ standard”
Constant revision and reporting on security
Amazon regularly publish the ‘’Service Organization Controls 1 (SOC1), Type 2’’ report, which is revised in compliance with SSAE 16in ISAE 3402 standards and clarifies the procedures and methods for ensuring active security of all services offered by AWS services.
Rights – limitations of functionality, reports, and graphs
In your company, an increasing number of users use MetaKocka. Some of them are employed in the company, while some of them are external contractors. Based on that, the principle of restricting access to data that is most valuable to a company is established. Learn more.
Restricting user’s access by IP (networking) address
Access to the user’s MetaKocka account can be restricted to a certain list of IP addresses (such as office PCs). Learn more.