Methods of Storing Data

Methods of Storing Data

Methods of Storing Data

Methods of Storing Data

We love privacy!

We love privacy!

We love privacy!

We love privacy!

Methods of Storing Data

Methods of Storing Data

Security methods of storing data

Security methods of storing data

  1. Patching
    We have automated systems in place that monitor the versions and vulnerabilities in all the projects that power Fleksy.

  2. Encryption at rest
    Our database has automatic encryption at rest, cloaking your data in another layer of protection.

  3. HTTP strict transport security
    Our application forces all requests over HTTPS, ensuring all traffic is secured in transit and protecting against protocol downgrade attacks.

  4. Security checks on build
    We have automated safeguards in place to check our code for potential issues before anything goes live.


  5. Private key authentication
    Where supported, we always use trusted certificate based private key authentication.

  6. Code review
    We draw on industry experience both internal and external to ensure our code is readable and maintainable. This helps us develop secure systems with ease and confidence.

  7. SSL/TLS
    All traffic between Fleksy and Fleksy’s infrastructure is encrypted in transit. We support TLS exclusively and only utilising strong cipher suites.

  8. Secure software development life cycle
    We put security at the heart of all our feature design and builds to ensure we are always maintaining our standards at 100%.

  9. Automated tests
    We have automated test suites to verify that team members can only see what they are supposed to.

  10. Key management
    We keep our keys secret and out of version control, to ensure access to critical resources cannot be compromised.

  11. Customer data regulation
    We never move user data out of the secured environment for testing or any other reason. Your data always stays where it’s put. 

  1. Patching
    We have automated systems in place that monitor the versions and vulnerabilities in all the projects that power Fleksy.

  2. Encryption at rest
    Our database has automatic encryption at rest, cloaking your data in another layer of protection.

  3. HTTP strict transport security
    Our application forces all requests over HTTPS, ensuring all traffic is secured in transit and protecting against protocol downgrade attacks.

  4. Security checks on build
    We have automated safeguards in place to check our code for potential issues before anything goes live.


  5. Private key authentication
    Where supported, we always use trusted certificate based private key authentication.

  6. Code review
    We draw on industry experience both internal and external to ensure our code is readable and maintainable. This helps us develop secure systems with ease and confidence.

  7. SSL/TLS
    All traffic between Fleksy and Fleksy’s infrastructure is encrypted in transit. We support TLS exclusively and only utilising strong cipher suites.

  8. Secure software development life cycle
    We put security at the heart of all our feature design and builds to ensure we are always maintaining our standards at 100%.

  9. Automated tests
    We have automated test suites to verify that team members can only see what they are supposed to.

  10. Key management
    We keep our keys secret and out of version control, to ensure access to critical resources cannot be compromised.

  11. Customer data regulation
    We never move user data out of the secured environment for testing or any other reason. Your data always stays where it’s put. 

© 2018 Thingthing Ltd. Proudly patent pending.
© 2018 Thingthing Ltd. Proudly patent pending.
Do NOT follow this link or you will be banned from the site!