Infraestructure - Europe

A SaaS company focused on Investment Management. It operates on 4 fundamental pillars in the delivery of solutions for investment management: experience, technology, productivity and excellence. Pivolt Platform Systems offered in SaaS mode are hosted in a secure environment that uses a firewall and other technologies to prevent interference or intruder access.

Infraestructure - Azure Europe

Effective security management to restrict access and segregate operational responsibilities. Logs and security analytics that allow auditing and monitoring of customer assets.
Fault-tolerant data centers that enable high-availability, attack-resilient scale-out architectures. Transparent internal security processes and controls in a third-party audited and certified framework.

Security - Pivolt

Authentication

Password policy

Security software as a service

Security - Database

Access to production bases is restricted to a limited number of points and production bases do not share a master password.

Security -SSL

SSL Digital Certificate Encrypted electronic file containing the public key. The information entered in forms (such as usernames and passwords) is encrypted before being sent via the internet and is only decrypted by the server that hosts the website. If the information is “intercepted” along the way by hackers, it cannot be deciphered.

Security - Application URL

Daily Vulnerability Scan. More than 32,000 tests are carried out divided into 17 categories in which most of these categories are aligned with the OWASPTOPTEN.

Security - Server IP

Server Scan (IP)
More than 11,000+ vulnerability tests are performed on hundreds of applications and operating systems. We maintain a comprehensive Vulnerability Knowledgebase. Almost daily, new subscriptions are added to this database.

Security - PenTest

Penetration Test (Pentest)

It identifies basic vulnerabilities that are not analyzed by automated tools, given their particular characteristics. Through the tests developed by Pivolt's security team, the adherence of the web application to seven specific points that often have their protection neglected are scored and can be exploited to identify failures and carry out attacks

Backup Policy

Database


Environment

Storage locations

Download Complete Security Report