Website, Infrastructure & Data Security at PORGiESOFT Group
Our Commitment
Your trust matters. Security is not an afterthought — it’s embedded in every layer of our platform. We work to ensure your data, messages, and insights remain safe, accurate, and available.
Our Security Principles
Confidentiality, Integrity & Availability — We protect your data against unauthorized access, ensure it is accurate and complete, and keep it accessible when you need it
Defense in Depth — Multiple layers of protection (network, compute, application, identity) reduce risk and prevent single points of failure
Least Privilege & Zero Trust — We assume no implicit trust, require strong identity verification, and minimize permissions wherever possible
Transparency & Explainability — We believe in making our security practices, AI models, and decision-making as clear as possible
What We Protect
We collect/store/process various types of data, including:
Messages flagged by customers for fraud checking
Metadata about message sources, timestamps, risk scores
Account and identity data of users
Usage analytics and logs for security/monitoring
We deploy in secure cloud infrastructure, hybrid infrastructure, SSL/TLS-enabled web and mobile clients, on premises infrastructure and so on.
Our Security Features
Reliability & Service Status
We maintain high availability through redundant systems, backup processes, and disaster recovery planning. Users can view current system status and uptime by contacting their designated contact for their account. In case of service interruptions, we aim to notify you transparently and resolve issues quickly.
Shared Security Responsibilities
While we manage many security controls, some responsibilities lie with you, including:
Keeping your login credentials secure
Using strong, unique passwords and enabling MFA or two-factor authentication
Using the latest supported versions of any client software
Responsible handling of sensitive output (risk scores, fraud datasets, etc.)
Certifications, Audits & Assurance
We maintain:
Compliance with applicable regulations including GDPR and DPA
Contact & Reporting
If you suspect a security issue, vulnerability, or breach involving our platform, please reach us at security@porgiesoft.com. We take reports seriously and aim to acknowledge issues within 24 hours.