Your data is safe with us

Security is one of our priorities

 


-IT-icona-riservatezza

Confidentiality

We guard your information

Access to your information is restricted to authorized persons.

The protection of information is guaranteed, as the Platform users can only view and edit the content they are entitled to.


-IT-icona-integrita

Integrity

We protect your data

Your data is always up-to-date, managed in compliance with the corporate governance.

THRON relies on AWS as its technological partner, which make sure the stored information is safe and whole (durability).


-IT-icona-disponibilita

Availability

The key to access your data

Data is always easily available to those who have the right to access it.

Thanks to the SaaS model, all the information stored in the THRON cloud can be retrieved at any time, anywhere in the World.

 

When buying software, make sure that the reseller has a universally recognized certification!

 

THRON certifications


logo-tuv-isoTesting corporation: TÜV

Certifications allow us to measure the levels of security and efficiency of corporate processes according to a universal and accepted standard. ISO is the standard par excellence, and validation can only happen through an official testing corporation. With this, we can discuss and compare ourselves with different companies from any country on a common ground.
iso-27001

ISO 27001:2017

THRON has always been at the forefront of data protection, and has set up  an Information Security Management System (ISMS) for organizational, technical and procedural processes in accordance with this standard.

We are committed to ensure the highest level of security day after day, protecting  both our own assets and those of our customers.

iso-27018

ISO 27018:2014

In the cloud environment as well, the company has a secure, high-quality  Personal Identification Information (PII) management system. 

THRON was born in the cloud, so it was crucial for us to  extend the security standards  we had already achieved with ISO 27001 to this environment too.

How we protect your data

 

sicurezza-omino

 

icona-sicurezza-codiceSecurity of the code

THRON follows the best practices of the OWASP (Open Web Application Security Project) for developing software securely.

We manage our servers in an infrastructure-as-code approach, i.e. automating as much as possible and avoiding manual interventions, in order to reduce the incidence of errors to a minimum.

icona-sicurezza-fisicaPhysical security

The Amazon Web Services data centers used by THRON are placed in secure locations that are not made public.

In addition, the information is redundant: the data is stored in several, physically separated, data centers.

AWS is also 27001 certified.

icona-sicurezza-serverServer management

We apply Amazon security best practices to manage server access: we have passed AWS Technical Audit, which certifies that we correctly implement these guidelines.

In compliance with the directives of the CIS (Center for Internet Security), we have set up monitoring that automatically detects and reports any security vulnerabilities.

icona-sicurezza-informaticaIT security

The software and the information it contains is protected by access control, with a customizable password policy.

THRON uses the https encrypted protocol, i.e. the data passing through THRON cannot be stolen and misused by third parties.

All data stored on THRON is also encrypted.

icona-sicurezza-reteNetwork protection

THRON is shielded from DDOS (Distributed Denial of Service) attacks, which could affect the availability of services for our customers, by AKAMAI, which monitors global traffic and blocks any anomalous flows that may run towards THRON.

This protection is added to the protection already provided by firewalls.

icona-sicurezza-condivisioniSecure sharing

Access to THRON files is secure and can only occur through a specific sharing. Only users with full access rights to a file can share it, and decide whether to make it downloadable.

All single sharing action is listed and can be revoked at any time, while the System Audit records all actions performed within the platform.

icona-sicurezza-continuitaService continuity

The average availability of THRON services is 99.9%. We use an autoscaling container technology: our distributed architecture can allocate, or shut down, parts of the infrastructure as needed. In addition, the automatic recovery procedures guarantee shorter response times than any manual intervention.

Data is replicated in 3 different AWS data centers, which ensures 99.999999999% persistence.

icona-sicurezza-backupBack-ups

In addition to replicating data in three data centers, we back up this information in three more data centers, located in a different country. This means that the information will remain intact even in the case of catastrophic events.

 

THRON is technology partner of AWS

-IT-aws-select-technology-partner

 

Do you need more information?

Write us!