The security of recorded information is something that we take seriously. That is why we take a large number of measures to keep our and your data as safe as possible.
Below you can briefly consult which measures we take.
The GeoDynamics software application is a centralised application that is located in a high security, redundant Twin datacentre setup; this way of working has made it clear to us from experience that for companies with a large fleet this is the right solution.This ‘geographically spread Active/Active’ configuration maximises the availability of IntelliTracer; one centre can completely fail, without leading to ‘downtime’ or experiencing data loss!
Strict security datacentre
Our servers are located in the Sentia network which connects directly to AMS-IX and BNIX.The implementation of Sentia’s security is also ISO 27001 certified.
This standard describes Information Security and its implementation describes a broad spectrum of measures and resources.
Secure communications via HTTPS
The communication between the browser of the end user and the server of the application occurs over an encrypted connection.This prevents the theft of sensitive information, your login data or the manipulation of your data.
Furthermore, the passwords are stored with encryption, which limits the chance of abuse.
If you use https, your password will be sent digitally signed or encrypted over the network.
Our servers are in our own network that extends over the two centres.
This internal network is, furthermore, not or barely accessible via another network.This allows us to prevent someone from being able to listen in unnoticed to a shared network.
Our software has a high-performance firewall.This ensures that our servers are shielded from the internet, and only that which is strictly necessary for the correct functioning is accessible.
Every user who wants to use the application must first obtain rights.
Furthermore, we can determine the permissible IP addresses per user, from which they can use the application.
Hence we can limit access, for example, from only within the business location.
Preventing known security risks
The software world today has a lot of security risks.
Our team keeps a finger on the pulse regarding these risks and spends a lot of time checking all current risks.
For example, the Intellitracer software prevents SQL Injection by consistently using SQL Parameters via Stored Procedures.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.