Yes, policies and procedures are established and mechanisms are implemented to detect, address, and stabilize vulnerabilities in a timeframe that matches the Security Patch Management Standards.
Yes, Xoxoday's products are supported by leading anti-malware programs. These are connected with our cloud service offerings and are a part of all our systems.
Yes, we perform periodic scans of operating systems and databases along with server applications for vulnerability and configuration compliance. This is done by using suitable vulnerability management tools as per the industry standards.
Yes, we ensure that there is no breach in network layers with vulnerability scans as per the industrial standards.
Yes, to check the hygiene of application layer, our vulnerability scans are done as prescribed by the industrial standard.
Yes, tenants can request for vulnerability scan reports.
Yes, in order to detect any unauthorized changes in the data or system configuration, we have a procedure in place for host/file integrity monitoring.
No, our periodic vulnerability scans are conducted just the right number of times to ensure prominence of security measures and protection of the operating system layer.
No, our periodic vulnerability scans are conducted just the right number of times to ensure prominence of security measures and protection of the database layer.
No, our periodic vulnerability scans are conducted just the right number of times to ensure prominence of security measures and protection of the application layer.
Yes, vulnerability scans and penetration tests are conducted periodically by third parties and external services to test our security measures.