SECURITY BY DESIGN USING INDUSTRY LEADING PROTOCOLS

Dashboard Screen.png

The Globig platform is developed utilizing maximum security guidelines. All data and files are secured from the moment you load them, share them within the platform, and remove them from the platform.

Our primary security protocols include end-to-end encryption, multi-factor authentication, cloud and disk storage, containerization, and secure file sharing. 

Asset 13.svg

ENCRYPTION

End-to-end encryption on all data transfers, active and at rest. We went beyond the industry standard. Not only do we encrypt between user browsers and our servers – all internal communications between backend services are also encrypted
Asset 13.svg

MULTI-FACTOR AUTHENTICATION

Identity and access management focused on multiple layers of security for use by employees, customers, and data processors
Asset 13.svg

CLOUD & DISK STORAGE

Secure storage at top global cloud storage provider in the EU. All files are double-encrypted, first by the storage provider and again by our system. Each file has its own encryption key – not even the cloud provider can read any data
Asset 13.svg

CONTAINERIZATION

Using Docker technology on Kubernetes Engine, all parts of the system are isolated from the public internet and are isolated from each other. Outside of the database, all data are stateless and no data are left behind on any system
Asset 13.svg

3RD PARTY APPLICATIONS

3rd Party applications can be provisioned with 'Access Tokens' that allows them to access the platform data via REST API endpoints to the backend server
Asset 13.svg

FILE SHARING

Files are transferred from user browsers to our server over an encrypted connection. Each file is encrypted on the server with its own unique key – all files cannot be decrypted at once. Once encrypted, files are sent to cloud storage over an additional encrypted connection

Would You Like To Learn More About Globig?

Schedule A Demo