Nothing is more important than protecting your data from unauthorized access or
potential data loss. Rintagi 4D platform in the cloud has a full rounded set
of security features ranging from user access to application deployment. Every application
built using Rintagi is secured over its entire life-cycle and a dedicated
server and databases are provided to maximize your privacy and security.
Trusted by the most security conscious financial institutions, we have data-security
built-in to our culture. Aside from the security features of our platform, we have
selected our technology partners and vendors carefully; we also adhere to comprehensive
employee training, company policies, confidentiality agreements, and vigorous testing
and quality assurance practices that go into every release of our technology.
Rintagi 4D platform is using Amazon Web Services (AWS), a highly trusted and
recognized infrastructure provider that has a reputation for providing one of the
most secure and reliable data centers in the world.
Reports, Certifications, and Independent Attestations. AWS has in the past
successfully completed multiple SAS70 Type II audits, and now publishes a Service
Organization Controls 1 (SOC 1) report, published under both the SSAE 16 and the
ISAE 3402 professional standards. In addition, AWS has achieved ISO 27001 certification,
and has been successfully validated as a Level 1 service provider under the Payment
Card Industry (PCI) Data Security Standard (DSS).
To more information please click on this link
The minimum level of access is allowed to your dedicated servers. Firewalls are
configured to grant access to necessary users, protocols, and ports; all others
are disabled and monitored. All operating systems and third-party software are kept
current. Databases and backups can only be accessed through trusted and encrypted
Every activity performed is tracked for future audit; they include:
- Enhancements or corrections in a new version;
- Deployment date time and the version deployed;
- Logging into the system;
- Backing up of the system;
Your application and data is being backed up every day from Monday to Friday in
a private and secure undisclosed location. Weekly, monthly and yearly backup can
be arranged for up to six years. We ensure your data is continuously available at
Rintagi built applications include a number of vulnerability prevention measures
at various stages of the development and deployment process.
During application design, the following configurations can be set:
- HTTP or HTTPs per page and web service when data encryption is required during
- Authentication required to restrict access to certain components per page;
- Network-based security when access needs to be restricted to a specific IP range;
During code generation, access controls determine whether the developer has permission
to generate and deploy the application and to use any external components, APIs
and data models.
Rintagi 4D platform generates, optimizes, and compiles C# code and stored procedures
with highly secure code patterns as below:
- Compression of server-side view states the content and avoids session data to
be exchanged in clear text;
- One-way password hash ensures the highest level of encryption and security
for database authentication and access;
- Stored-procedures plus encryption prevents SQL code injection at runtime;
- No late binding or runtime access to any pre-compiled code prevents C# code injection;
- Dedicated database and isolated connection pools prevents unplanned cross application
and cross database access at runtime;
- Session identifiers are strongly typed and validated to prevent intrusion on
existing sessions from uninvited guests and devices;
- Comprehensive exception handling and error tracing;
End User Security
Each failure attempt to login is tracked. The system will shut down after five (5)
unsuccessful logins. Performing “Forget Password” procedure is the only way to regain
access to the system.
Out-of-the-box single sign-on capability allows you to unify all your logins across
all the applications and databases. After that the user can move seamlessly across
applications and databases without additional logins. CAPTCHA can be added easily
to make sure the person logging in is human.
Both role-based and membership-based access controls are provided. Users can be
provisioned and grant access to one or more roles, representing one or more organizations,
or specific permission configuration down to the cell level. These access rights
can be applied across applications and databases.
Every access to your application screens, reports, and wizards are tracked automatically.
These logs can be filtered by over ten parameters and include the date and time
of the access, which user accessed it, etc. This allows you to effectively track
down any security issues that may arise.
You own all data maintained in your application. Our engineers only access your
servers and databases when it is necessary to perform system management, maintenance,
monitoring, and backups.