Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Unit Protection

Login

 Protocol Between
Clients and Server

System Architecture

Development

General

 

Propriety protocol between on-site units to servers

  • Optional - HTTPS secured communication between unit to server

Password Managing

  • Date

  • Complexity (length & combination

  • Controlling use (specific dates and times) time according to clients preference  

  • After five incorrect password attempts, a temporary block is placed on the user

 

Token based connectivity

 Server systems are departmentalized, with different secured VPCs without the possibility of accessing DB 

 Separated environment for test and production  

ISO 27001

Optional adding Private APN/ Restricted APN

  • Communication only between the Sim card and the connecting

SSO Login

  • Identifying users with Google/ Microsoft/ App Microsoft

Fully secured client-server communication - HTTPS

AWS environment 

  • Fully complying with security regulations and SOC

 

GDPR 

ID to every unit

  • Only allowed devices can connect

Re Captcha V3

  • Anti-automation

 End Clients installed applications are fully signed

Replicating the systems in case of an emergency

 

 

Audit trail

  •  Monitoring and recording user actions in every part of the systems

  • Security logs and events in real-time security events in the system

IDP Engine

 

All emails from the Galooli system sent only from
"no-reply.galooli.com"

 

 

 

RBAC

  • Rolled-based access control to every user in the system

 Allowed IPs

  • Option to login into the system exclusively through the internal network of the organization

 Secure File Transfer Protocol (SFTP)

 

 

 

Session Timeout

  • Session timeout option, which will automatically log users out after a specified period of time if no activity is detected.

Disable Inactive Users

  • The system will automatically disable users who have not logged in for a specified period of time, i.e., they will be locked out and will not be able to access the system.

Two-Factor Authentication

  • Ensure top level security for your account with Two Factor Authentication via Google Authenticator.

...