Cybersecurity
iAutomator designs each deployment by selecting the infrastructure, vendors, and protective measures best suited to each organisation’s profile and compliance requirements. However, always with:
.png)
Data at rest encrypted with AES-256
.png)
Data in transit encrypted with TLS 1.2+
.png)
MFA authentication via password plus Google or Microsoft Authenticator
.png)
Continous security configuration reviews
We offer hosting on both Virtual Private Server (VPS) and Private Virtual Machine (VM)
.png)
With full-disk encryption (AES-256)
.png)
Security updates applied automatically
.png)
With modular architectures to avoid vendor lock-in
Alignment with GDPR and UK GDPR
We select infrastructure providers hearquartered in, or with operational presence in the EU, and with security certifications that can be independently verified