Audit Log Control, Log Retention (Logon Retention, Change Log Retention)
Q: Please indicate how audit log files are protected from unauthorized alteration
A: The logs files are require permission to access and only ready by request.
Q: Does the application support capture of user access activity such as successful logon and logoff?
A: Yes, itβs available in the logs and database. It is available on demand.
Q: Can the application continue normal operation even when security audit capability is non-functional? (For example, if the audit log reaches capacity, the application should continue to operate and should either suspend logging, start a new log or begin overwriting the existing log)
A: Yes
Any security rule applied to iSlash?
Applied server hardening
Applied Port restriction
Applied brute force attack prevention
2 factor verification for user login
256bit SSL encryption certificates
Backup & Recovery
(Backup Policy, Recovery Point of Objective, Recovery Point of Time)
We have full backup every 48hours and keep for last 180 days
Backup sites
Data is backed up on a daily basis on multi-region clouds.
Penetration Test
available by request
Segmentation
Q: Any Dedicated database?
A: You have an option to go for dedicated hosting , with a fee of USD 2000/ month
Q: Separate from other customers?
A: Yes, your data will be segregated with other customers in a separate database.
Is the personal information secure?
Your account is protected by a password for your privacy and security.
And your account is protected by One time 2 Factor Verification code.
You must prevent unauthorized access to your account and Personal Information by selecting and protecting your password appropriately and limiting access to your computer or device and browser by signing off after you have finished accessing your account. We endeavor to protect the privacy of your account and other Personal Information we hold in our records, but we cannot guarantee complete security. The transmission of information via the Internet is not completely secure. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time.
When you enter your information on our site we encrypt the transmission of that information using transport layer security (TLS).