What is a SaaS service?
A SaaS (Software as a Service) solution is a software-as-a-service model. This means you can access software over the internet without installing anything on your computer. Access is done simply through the solution's web page with a username and password.
Security and data protection: our top priority
At YANOVA, we understand how crucial the confidentiality, integrity, and availability of your data are.
As a SaaS solution dedicated to GDPR and IA-ACT compliance, we have implemented a range of rigorous technical and organizational measures to ensure an optimal level of security.
Our approach is based on several fundamental pillars:
- Robust architecture: built on proven technologies and regularly updated.
- Advanced encryption protocols: to protect the exchange and storage of sensitive data.
- Strict access control: ensuring only authorized users can view or modify your information.
- Continuous monitoring: using advanced intrusion detection and logging systems to anticipate and quickly react to potential threats.
- Regular audits: and a strict internal governance policy ensuring constant compliance with regulations and best practices in security.
Below, you'll discover all our commitments and concrete measures to secure your data daily: from user identity management to automated backups, data transmission encryption, and incident management processes.
Thanks to these measures, you can use SECOYA with peace of mind, knowing your data's protection is at the heart of our priorities.
Features Overview
Multiple DatacentersOur data is hosted in France across multiple datacenters in different regions.
Daily SnapshotsA daily "snapshot" of the system is taken and duplicated across multiple datacenters.
Database BackupDatabases are backed up hourly to ensure data safety.
Unattended UpgradesOur systems benefit from daily security updates.
System MonitoringOur servers are continuously monitored by advanced detection and supervision systems.
MFAMandatory use of multi-factor authentication for secure access.
EncryptionSystematic encryption of personal data and documents.
Coding StandardsOur applications are developed following OWASP best practices.