loader
https://shootih.com

Shootih - Helping SMEs and SMBs
Manage, Track and Grow Their Money
In A Responsible and Secure Way

ISO 27001 Certified

Our development team is accredited with one of the world’s most recognised quality management standards certifications for data storage and security. We ensure:

  • Heightened information security and data protection
  • Safeguard all company and financial transaction data
  • Improved business resilience
  • Increased reliability and security of systems and information
  • Every employee is background checked and screened.
security-feature

Your data when stored and in transit is encrypted

All your data is encrypted using AES 256 bit encryption standard which is approved by the US National Security Agency (NSA) for protecting top-secret information.

  • It is the strongest encryption standard available
  • We use this robust security algorithm in both hardware and software.
  • It is resilient against hacking attempts.
  • 2 Factor authentication is used to give access, only possible with your OTP.
security-feature

Business Continuity & Disaster Recovery Plan

We have built a resilient infrastructure to mitigate risks and ensure business continuity using cloud-based data protection solutions. These solutions help us:

  • Protect and retrieve critical business data,
  • Monitor the health of our data protection environment
  • Comply with government and industry regulations.
  • Manage data backup
security-feature

Amazon Virtual Private Cloud provides us with the ability to increase and monitor the security for our virtual private cloud (VPC).

Amazon Virtual Private Cloud provides us with the ability to increase and monitor the security for our virtual private cloud (VPC).

  • Each customer’s data is securely siloed in separate data partitions and the sensitive data is encrypted. No one including the development team will get access to your data without you knowing it. Only when you authorize, monitored access is given to the team. The access is always READ ONLY.
  • Gives us complete control over the virtual networking environment including resource placement, connectivity, and security.
  • Create one ISOLATED network where we can define the access level for outside users and inside users which protects the network from any vulnerabilities
security-feature

Audit and Reporting

  • We are always proactive in identifying the data breach in our system.
  • We make sure that all your data is deleted once you stop services with us. Please refer to our Data Purging document for more information.
  • We support OTP based authentication
security-feature

When you decide to leave us

We make sure that all your data is deleted once you stop services with us. Please refer to our Data Purging document for more information.