Application Security
Secure Hosting
AWS' military-grade security measures support JustiFi's cloud environments.
User Permissions
Assign user role permissions to limit access.
SSO
JustiFi offers single sign-on user access controls.
Data Handling
In full compliance with GDPR, JustiFi has support for data deletion.
Enryption
In transit data is encrypted using TLS 1.2, and at rest data is encrypted using AES.
Monitoring
Continuous testing for vulnerabilities, threats, and penetration by an impartial third party.
Penetration Testing
We conduct an independent third-party penetration test at least once a year to ensure that our services' security posture is uncompromised.
Security Awareness Training
Employee security awareness training covering industry standard practices and information security topics such as phishing and password management is required for all members of our team.
Information Security Program
We have implemented an information security program that is communicated throughout the organization. Our information security program adheres to the PCI-DSS and SOC 2 standards.
Roles and Responsibilities
Roles and responsibilities for our information security program and the protection of our customers' data are clearly defined and documented.
Third Party Audits
Our organization is subjected to independent third-party assessments to test our security controls.
Continuous Monitoring
We constantly monitor our security and compliance status to ensure no gaps or vulnerabilities exist.
