How can I be certain of the security and conformity of Izimi?

Izimi

Fednot has implemented a secure development approach with the aim of protecting information and assessing the risks involved in the Izimi application. The development team attended a security training course. The Izimi application was extensively tested by leading players in the security world.

The penetration tests were performed:

  • for the Internet application, according to a methodology based on an established standard and documented best practices such as the  OSSTMM, PTES and OWASP testing methods and standards.
  • for the mobile application according to OWASP Mobile Application Security Verification Standard (MASVS) Level 2 (v1.2).
Did you find this FAQ helpful?
0
0