IT security
Home Services IT security

IT security


The protection of your data is our top priority!

Compliance with high security standards and with the regulations such as the EU General Data Protection Regulation is of great importance to us. Therefore we have taken various precautions and offer you a multitude of functions which can be used on our platform.

100% Hosted in Germany

100% Hosted in Germany

Your data will be saved and processed solely in Germany.  

ISO 27001 certified computing centers

ISO 27001 certified computing centers

Our platform solution runs on servers in ISO 27001 certified computing centers, which stand for excellent availability and IT security (multiple security measures have to be kept) of all cloud services. 

Application of D-Trust SSL certificates (Bundesdruckerei

Application of D-Trust SSL certificates (Bundesdruckerei)

The Bundesdruckerei (Germany's Government Printing Office) is a Trust Service Provider (CA), providing public trustworthy certificates. We use SSL certificates reassuring the users of our platform solution that there is a real and trustworthy institution (FoodBusiness.Digital GmbH) behind the selected website. This verification respectively security ensures that sensitive data are exchanged in encrypted form.

Two factor authentication

Two factor authentication

The two-factor authentication can be used for varied processes (e.g. platform user login). We offer solutions based on SMS or tokens (MobileApp).

Whitelisting

Whitelisting

In the case of automated access attempts on our platform solution (e.g. exchange positions imports) the authorization based on the whitelisting principle takes place. Users, IP addresses, email adresses which have not been stored explicitly will be denied any form of communication and interaction. 

Secure Communication Tunnels (SSH & SSL)

Secure Communication Tunnels (SSH & SSL)

For the data exchange (e.g. export of trading activities) we exclusively use secure connections based on SSH or SSL/TLS.

Public-Key-Authentication

Public-Key-Authentication

Optionally we offer this authentication method in order to additionally secure sensitive data (e.g. user master data) alongside the secure communication tunnels.

Sicherheitsupdates​

Security updates

The servers, data bases, frameworks, etc. used by us are always kept up-to-date. We always make sure to install all patches, fixes, etc. provided by the producers in the background.

WordPress Cookie Plugin by Real Cookie Banner