Strong and robust data security
is our top priority

DATA PRIVACY FIRST!

DATAPINE WORKS WITH THE LATEST ENTERPRISE-GRADE SECURITY FRAMEWORKS

Protecting your data is our top priority! The confidentiality, privacy and security of your data is of our utmost importance. We use multiple safeguards to protect your information, and we are in a constant process of monitoring and improving our enterprise-grade security layers known from core banking applications.

GERMAN DATA SECURITY LAWS

As a German engineering company, we are subject to data security and privacy laws that are among the strictest in the world. At any time, our customers remain the sole proprietors of their data, and only authenticated users from your account will have access to your information.

PHYSICAL SECURITY

Our data centers are protected 24/7 by electronic access control, video surveillance and alarm systems. Even we at datapine do not have the permission to enter the secured data center without a valid legal reason.

Secure Transmission and Session handling

We keep virtual intruders out by transferring critical data via SSL and SSH protocols.

Access control

datapine has read-only access to your datasource and an additional layer of security that prevents harmful database queries from coming through (SQL injection).

OUR SERVERS

We host our application and your data on dedicated servers with a German top-tier hosting provider. At no point we work with cloud hosting solutions. We only store your data if you specifically give us permission, we do not make copies nor are there any backdoors. If you decide for a remote database connection, we run all queries on your server without storing or transferring any of your raw data.

TESTING AND MONITORING

We test all code parts for security vulnerabilities before every release and regularly scan our network and systems for vulnerabilities. Among others we perform:

  • Application vulnerability threat assessments
  • Selected penetration testing and code review
  • Security control framework review and testing

To identify and manage threats, our team furthermore monitors notifications from various sources and alerts from our internal systems.