T3 Software Security
We take great pride in protecting you! This is an overview of the daily steps we take to ensure your data is secure with T3 Softwares and that our hosted version, the T3 Softwares Cloud, follows best security practices.
We take great pride in protecting you! This is an overview of the daily steps we take to ensure your data is secure with T3 Softwares and that our hosted version, the T3 Softwares Cloud, follows best security practices.
T3 Softwares Cloud servers are housed in reliable data centers across the Equinox, Corporate Co Location, Google Cloud EMEA Ltd, Endurance International Group, Inc and each one of them needs to meet our strict physical security requirements:
Encryption is used for both in-transit and at-rest customer data transfers and storage.
T3 Softwares is made to avoid introducing the majority of common security flaws:
Independent businesses that our clients and prospects contract to do audits and penetration test their application(Cost to be paid by client). When necessary, the T3 Softwares Security Team reviews the results and implements the necessary corrective actions.
However, as those results are private and belong to the commissioners, we are unable to share any of them. Don’t ask, please.
In addition, T3 Softwares boasts a vibrant community of independent security researchers that collaborate with us to enhance and fortify T3 Softwares’s security by regularly monitoring the source code.
According to the Open Web Application Security Project (OWASP), the following is T3 Softwares’s position on the most critical security vulnerability for web applications:
To report a security vulnerability please contact T3 Support. These reports are given top attention; the T3 Softwares security team promptly investigates and resolves the issue in conjunction with the reporter, and the information is subsequently responsibly shared with T3 Softwares users and customers.