Predikat Application Security At Predikat, we continually strive to improve our software development and internal operational processes with the aim of increasing the security of our software and services. Security is at the forefront of our products and infrastructure.
Network The Predikat website is secured by SSL certificates signed by trusted authorities and the only protocol for accessing it is HTTPS.
Application We implement a well-defined permission- action mapping set and assign necessary and sufficient permissions to each system user without exception.
Data We provide secure multi-tenancy that strictly prevents access to each client's data from other clients' users, and their user data. The data we have access to is anonymised, and we often integrate with tools like Segment, which adds another layer of protection.
How we protect your Information We adopt strict data collection , storage and processing practices and security measures to make sure we protect against breaches, hacks, or leaks of your personal information and data stored on the websites or through Predikat applications.
Platform We deploy our applications to a commonly-used, and secure cloud platform called AWS (Amazon Web Services)
Support Access to customer data in scope of support operations is provided by a standardized approval process and it is limited to the access requirements of the specific case.
Awareness Our staff is well-informed and has a high awareness about application, network and data security.
Third Parties Predikat is integrated to secure third party data platforms such as Segment.