As a leading Business Process Management (BPM) and Application Platform-as-a-Service (aPaaS) provider, Quixy enables businesses to design, develop, deploy, and manage enterprise-grade applications. Security is the highest priority with a strict no-compromise policy being adhered to at each and every step. Starting with the choice of cloud infrastructure that hosts the platform, the platform per se, and the ready-to-use applications designed on the platform – all of these three crucial aspects necessarily meet the highest security standards.
At Quixy we make security a priority at every step right from code development to incident response through the three aspects as mentioned. Starting with detailed planning, sound architecture, and efficient operations, we put everything into providing a stable, innovative, and secure platform.
When stored within the Quixy Cloud, our customers should monitor their data. Under no circumstance do we disclose customer data to law enforcement authorities unless as directed by a customer or where required by law. When governments make a lawful demand from Quixy for consumer data, we aspire to be driven by standards, restrained in what we report and adhere to transparency.
Compliance plays a crucial role in our customers’ interest and performance. We are committed to complying with the laws and regulations which apply to us as we take our business forward worldwide. In addition, we use universal standards to meet our client’s expectations as an organization or in a collaborative effort.
According to its documentation, ISO 27001 was developed to “provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system. ” Quixy considers security not to be optional, so therefore we aligned our vision on security along the three pillars of information security, better known as CIA, standing for Confidentiality, Integrity & Availability.
A SOC report is a verifiable auditing report which is performed by a Certified Public Accountant (CPA) designated by the American Institute of Certified Public Accountants (AICPA). It is a collection of offered services of a CPA concerning the systematic controls in a service organization.
There are three types: SOC 1, 2 and 3.
SOC 1 report is mainly concerned with examining controls over financial reporting. SOC 2 and SOC 3 reports focus more on the pre-defined, standardized benchmarks for controls related to security, processing integrity, confidentiality, or privacy of the data. SOC 2 is a restricted use report while SOC 3 is a general use report.
There are two types: Type 1 and Type 2.
Type 1: A point in time audit, during which auditors evaluate and report on the design of controls a company puts into place as of a point in time.
Type 2: This type is more stringent compared to Type 1 and verifies the effectiveness of the security controls over an extended period of time. Auditors usually recommend a 4-6 months period for the first audit, and a 6-12 months period for consequent audits. It is important to note that there are no requirements or standards for the audit duration other than a 3 months minimum period.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Targeting cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.