SECURITY

Website, Infrastructure & Data Security at PORGiESOFT Group


Our Commitment
Your trust matters. Security is not an afterthought — it’s embedded in every layer of our platform. We work to ensure your data, messages, and insights remain safe, accurate, and available.


Our Security Principles

  • Confidentiality, Integrity & Availability — We protect your data against unauthorized access, ensure it is accurate and complete, and keep it accessible when you need it

  • Defense in Depth — Multiple layers of protection (network, compute, application, identity) reduce risk and prevent single points of failure

  • Least Privilege & Zero Trust — We assume no implicit trust, require strong identity verification, and minimize permissions wherever possible

  • Transparency & Explainability — We believe in making our security practices, AI models, and decision-making as clear as possible


What We Protect

We collect/store/process various types of data, including:

  • Messages flagged by customers for fraud checking

  • Metadata about message sources, timestamps, risk scores

  • Account and identity data of users

  • Usage analytics and logs for security/monitoring


We deploy in secure cloud infrastructure, hybrid infrastructure, SSL/TLS-enabled web and mobile clients, on premises infrastructure and so on.


Our Security Features

  • Identity & Access: Role-based access control; require multi-factor authentication; strong password policies; audit logs of logins/role changes
  • Encryption: TLS in transit; AES-256 (or similar) encryption at rest; key management via secure vault services
  • Infrastructure & Platform: Hardened servers; regular patching; secure cloud providers; isolation of environments; least-privilege network segmentation
  • Application Security: Secure coding practices; regular vulnerability scanning; audits; input sanitization; web application firewall or equivalent protections
  • Monitoring & Incident Response: Continuous monitoring of logs; alerting; incident response plan; security incident post-mortems
  • Compliance & Audits: GDPR compliance; DPA compliance; independent security assessments; data protection impact assessments


Reliability & Service Status

We maintain high availability through redundant systems, backup processes, and disaster recovery planning. Users can view current system status and uptime by contacting their designated contact for their account. In case of service interruptions, we aim to notify you transparently and resolve issues quickly.


Shared Security Responsibilities

While we manage many security controls, some responsibilities lie with you, including:

  • Keeping your login credentials secure

  • Using strong, unique passwords and enabling MFA or two-factor authentication

  • Using the latest supported versions of any client software

  • Responsible handling of sensitive output (risk scores, fraud datasets, etc.)


Certifications, Audits & Assurance

We maintain:

  • Compliance with applicable regulations including GDPR and DPA


Contact & Reporting

If you suspect a security issue, vulnerability, or breach involving our platform, please reach us at security@porgiesoft.com. We take reports seriously and aim to acknowledge issues within 24 hours.