How We Guarantee Security
We enable data security through internal procedures and follow global security standards.
We enable data security through internal procedures and follow global security standards.
Only users with an ID card (guest, IT staff, administration etc.) have access to our offices. This measure along with video surveillance cameras allows tracking and managing access to the critical physical facilities (servers, workstations).
Our offices are divided into different access zones. Certain resources (file servers, for example) are restricted to a limited group of users, with permission-based access control implemented.
All sensitive infrastructure hardware is duplicated and located in two separate protected server rooms with restricted access.
To ensure our hardware security, we have established three duplicated internet links and two data links between offices.
Data backup and data replication are in place so that no bit of data is lost in case the system is under attack.
Domain-level controlled antivirus
Software restriction policy
Network attack blocker on all workstations
IPS (intrusion prevention system) on gateways
Antispam and more
Least user access policy
Regular infrastructure monitoring
Installation of anti-malware software
Password management
IP security training
(protection against phishing attacks, social engineering, etc.)
Email authentication, etc.
The infrastructure works autonomously in case of emergency. It is compliant with the security and fault-tolerance requirements from enterprise clients and large financial groups (Societe Generale, Raiffeisenbank, BNP Paribas).
There are 2 independent broadband channels in each office. The channel redundancy is important to ensure that office operation remains unaffected by local Internet accidents.
As an electricity backup, the offices and server rooms have a transfer switch. In case of an accident, it switches to the backup generator. Besides that, each computer is also secured by an Uninterruptable Power System (UPS).
Chief Information
Security Officer
“At Qulix, we give the highest priority to information security and follow enterprise-wide processes to build secure development, testing, and deployment environments. We have adopted the ISO 27001-based Information Security Management System to ensure that a secure business environment is established for both our internal as well as the client’s data.”
See our Information Security Policy for more details.
IP protection is secured at 2 levels — administrative & legal restrictions and infrastructure restrictions. It means that:
We always sign an IPR transfer agreement with our employees stating that all artifacts (etc.) produced during the project due course belong to the company.
In addition to that, there is quite an efficient schema of permissions and access control, so only authorized team members can access certain information.
All employees sign individual non-disclosure agreements (NDAs). Additionally, we always have NDA clauses in our contracts or separate NDAs.
All intellectual property rights are transferred to the client, which is explicitly specified in our legal agreements. The transfer is properly documented to avoid any legal pitfalls for the client.
This enables us to thoroughly protect our financial information, intellectual property, employee details, or information entrusted by third parties.
We follow the best recommendations of OWASP in terms of security tools and resources, networking as well as on-site staff training.