FAQ
Image

Fednot has implemented a secure development approach with the aim of protecting information and assessing the risks involved in the Izimi application. The development team attended a security training course. The Izimi application was extensively tested by leading players in the security world.

The penetration tests were performed:

  • for the Internet application, according to a methodology based on an established standard and documented best practices such as the  OSSTMM, PTES and OWASP testing methods and standards.
  • for the mobile application according to OWASP Mobile Application Security Verification Standard (MASVS) Level 2 (v1.2).
Did you find this FAQ helpful?
Thumbs Up Icon 2
Thumbs Down Icon 2

Helpdesk

Do you have a question about Izimi?
You can't connect or you have a technical problem?