SECURITY

We work hard to protect our systems.
SSL/TLS Certificate

Transport Layer Security (TLS) and its predecessor Secure Socket Layer (SSL) are cryptographic protocols designed to provide secure communication over the computer network. As a security measure, our systems encrypt all connections from your browser to the cloud server and from the cloud server to the real server, preventing interfering attacks and securing transactions.
End-to-End Encryption

Most of our services are encrypted using SSL / TLS, but we still pass some private data to a 2nd encryption in addition to the SSL / TLS certificate. This encryption takes place end-to-end and in your browser, and even on server, the data will be encrypted so no one can access your data except you.
DDos Protection

Although a number of measures have been taken, measures such as firewalls, CDN structure, and application limitation have been taken against DDos attacks such as DNS Flood, UDP Amplification (Layer 3 & 4) and HTTP Flood (Layer 7), which may still come from inside or outside.
Access Protection

Numerous measures have been taken to ensure that only the desired people can access the systems. These measures strictly control access to the system as a whole and automatically prevent unauthorized access when necessary.
Firewall
Our systems are protected by firewalls. Some of them serves as a Web Application Firewall (WAF) and provide additional protection to normal firewalls. One of the Web Application Firewall used has been specially developed and continues to be developed within our systems. Other software is constantly updated.
2-Step Verification
Most people only have one layer – their password – to protect their account. With 2-Step Verification, if a bad guy hacks through your password layer, he'll still need your phone or Security Key to get into your account. With 2-Step Verification, you'll protect your account with something you know (your password) and something you have (your phone or Security Key).
Security Controls
Security checks are frequently performed. To protect against unauthorized access to systems, we review our practices for collecting, storing and processing information, including physical security measures. We encrypt important data, keep transactions, and take precautions, such as keeping some data, such as your passwords, in the form of passwords or hashes that we cannot even see.
Penetration Testing
By detecting logic errors and vulnerabilities in our systems, we frequently perform security tests to prevent abuse of these vulnerabilities by malicious people and to make systems more secure. OWASP (Open Web Application Security Project) identified the most risky 10 vulnerabilities, mainly through manual and software scanning a large number of vulnerabilities and measures are taken.
Anti-Virus
The servers are protected by firewalls as well as antivirus software. Tracks down and destroy any existing malware hiding in a system.
Anti-Spyware
Detects spyware threats and destroys each infection. This is done automatically.
Anti-Malware
Kills malicious processes before they can do harm. In particular, protection measures have been taken against advanced threats that have recently become highly risky, such as ransomware.
Anti-Rootkit
Rootkit is a virus-derived malware that infiltrates the computer's operating system kernel with features such as remote control of your computer and providing full authority to malicious people. Our Anti-Rootkit system scans our servers, detects and removes rootkits.
Bot Protection
It is a type of attack that has caused too many problems in the past. Bot Protection prevents malicious software turning your PC into a zombie.
Defense +
Although it is important to clean up a malware after it has infected our system, it may still have been able to do damage. This is a situation we do not want. Protects critical system files and blocks malware before it installs.
Memory Firewall
Buffer Overflow is the situation where more than the size of a buffer is allocated for data communication between the two software. Buffer Overflow, if not stopped, can be used to perform all kinds of operations. Cutting-edge protection against sophisticated buffer overflow attacks.
Auto Sandbox Technology
Runs unknown files in an isolated environment where they can cause no damage.