Protection of information

Linux

Apart from standard functions for protection provided by OS and DBMS, our company provides proprietary solutions for data protection.

  • A password cannot be traced and stolen in intranet:
    Protocol of data exchange between a user and calculation kernel is encrypted.
  • No operation can be performed without logging the name of an operator:
    Calculation kernel automatically records all operations with date, time and user's name.
  • You cannot access the database using user's password bypassing calculation kernel:
    The calculation kernel substitutes a password for data access.
  • You cannot copy database:
    Key data are encrypted.