We take security very seriously. The system undergoes regular penetration tests commissioned by our clients and carried out by specialized companies. We participate in these tests, promptly address any identified vulnerabilities, and implement the recommended measures. The system has received a positive assessment from the Cyber Defense Component Command regarding installation within the internal network of the Ministry of National Defense.
Login Security
- The system administrator can enforce specific password complexity requirements and set how often users must change their passwords.
- The administrator can set a threshold for failed login attempts, after which the user is blocked. Only the administrator can unlock the account.
- As an option, 2FA can be enabled with a code sent via email.
- The system includes a module that allows the administrator to access selected system logs (e.g. logins, failed login attempts, etc.).
Server Security
- For SaaS licenses, detailed information is provided only to clients.
- The servers are monitored for suspicious activity using specialized tools.
- For Enterprise licenses (installed on your own server), we fully cooperate on recommendations and configuration to meet the organization’s security policy requirements.
Data Security
- We perform backups every 24 hours, encrypt them, and store two copies on separate servers.
- Your data is stored in a separate database. Instances do not share databases.
- The standard system recovery time from a backup after a potential failure is 2 hours during working hours (unless a separate SLA specifies otherwise).
Access to Your Data and Server
In the case of a SaaS deployment
- Your client manager may (but is not required to) have a service account in Usemaps, which can sometimes be useful for troubleshooting.
- Our server administrators have access to the database.
In the case of an on-premises deployment (within your infrastructure)
- We do not have access to Usemaps or the server.
- Updates are carried out according to a strictly defined procedure.
- Granting access to your machine for our Server Administrator is optional (e.g., via a VPN tunnel).
We are open to providing specific information when requested.