IMPORTANT! Please read this Policy before using APPscreener services
This page outlines the mechanisms and procedures Solared Cyber Security Limited (“We”) has taken to deliver its secured cloud-based Application Security services (“APPscreener service”).
Data Storage and Processing
We operate our APPSreener service from the United States. If you are located in another country, please be aware that information we collect will be transferred to and processed in the United States. By using APPScreener service, or providing us with any information, you fully understand and unambiguously consent to this transfer, processing and storage of your information in the United States, a jurisdiction in which the privacy laws may not be as comprehensive as those in the country where you reside and/or are a citizen.
Software analysis is performed automatically and without human intervention.
Your files uploaded to the APPScreener service are private to your Account
Scan results are treated just as securely as your uploads, you own them and control them. Results are deleted securely by users.
Analysis results are saved in report form, and source code is deleted from the Software immediately after analysis is finished (nevertheless reports can include small fractions of analysed source code to illustrate identified vulnerabilities).
Client – Server Connection is encrypted using TLS in transit
Multi-layered protection
Role-based access controls - End user viewing, access and uploading permissions.
Administrative auditing - manage users, groups, and access permissions, and audit user activity
Protection of your privacy – Please refer to our Privacy Policy.
Comprehensive security at every level
Highly scalable and redundant online infrastructures
Constant monitoring of production systems
Ongoing threat assessments
Company performs dynamic and static scans on any code changes we make to our software.
Protection at the network level
Servers reside behind sophisticated firewall that selectively grants access to network resources
External penetration testing performed for system security and validation
Multiple internet backbone connections provide routing redundancy and high-performance connectivity
Intrusion Detection System (IDS) continuously monitors network traffic
Protection at the facilities level
Servers hosted in redundant facilities, which are automatically backed up to a geographically-separated site
Data centers implement ongoing audits, 24/7/365 monitoring and surveillance, on-site security staff, mantraps and strict access controls
Power systems feature multiple power feeds, UPS devices and backup generators ensure continuous operation
.