Security

Download a PDF

We place a very high priority on security. From the design stage of every solution and functionality, data security and system processes are carefully considered.

We use proprietary technologies that undergo detailed testing. We do not use off-the-shelf components; all iPresso functionalities are developed in-house. This gives us full control over the source code, processes, resources, and the operational logic of every element within the system.

Systematically conducted audits:

  • Penetration testing
  • Information security management
  • Service quality management
  • Physical security
  • Compliance with applicable standards

Physical security

Physical security

It aims to prevent unauthorized access to buildings, equipment, and resources, as well as to protect employees and property from destruction and damage. Multi-layered, interdependent solutions are used here, such as CCTV monitoring systems, security personnel, protective barriers, locks, and access control protocols.

  • Multi-level security zones in data centers
  • Data centers meeting Tier III and Tier IV requirements
  • Redundancy of key physical layer infrastructure elements
  • Independent locations
  • Administrator team

Network security

It consists of procedures and practices used to monitor and protect against unauthorized access, misuse, or modification of the internet network and the resources available within it. It includes the process of authorizing access to network data, managed by the network administrator.

  • HTTPS
  • Secure architecture
  • Incident management
  • Redundancy of key network layer infrastructure elements
  • Hardware WAF

Performance

  • Real-time processing of high data volumes
  • Database management for > 10 million contacts
  • SLA > 99%
  • Monitoring

Transmission

  • SSL/TLS
  • Firewall
  • Security incident management procedures

Access control

  • Password policy
  • Unique addresses
  • IP restriction
  • LDAP (User role and group management)
  • SSO
  • 2FA
  • R&D with internal access via VPN

GDPR

  • Marketing consent management
  • Unsubscribe pages (Opt-out pages)
  • Profile pages in multiple variants (Multivariant preference centers)
  • Statistics
  • Anonymization and data deletion

Standards

  • ISO 27001
  • ISO 9001
  • Privacy policy
  • Safety policy
  • Compliance with IAB standards