IT SECURITY


The following context diagram shows the technical implementation of the JAROWA Security Concept.

 

JAROWA implements high IT security standards to ensure the integrity of the data. JAROWA offers the following, among others: 

 

A secure login:

Individual networks or accounts have the option of activating 2-factor authentication. 

 

Secure data transfer:

All data is encrypted during transmission between the user and the JAROWA Data Centre (256-bit encryption). 

 

Secure access:

Access to JAROWA is protected by a web application firewall that detects and prevents unauthorised access attempts and hacker attacks. Penetration tests are carried out at regular intervals. Hacker attacks are thereby simulated by experts, and the system is tested for vulnerabilities. 

 

Secure data storage:

256-bit encryption is used to store the sensitive work order data and all the documents in the JAROWA database.