The protection of your privacy and your personal data is important to us. Our team works intensively in the background to keep your data secure, protected and private. This is reflected in the design of our software.

Encryption of data

Sensitive data stored in Falcon's corporate network is encrypted with AES-256. This applies to all types of stored personal information such as first and last names, email addresses, activities or measures.

Encryption of data traffic

Falcon uses the latest encryption technology to encrypt transit traffic using TLS 1.2 protocols, AES-256 encryption, and SHA-256 signatures. The key exchange is secured using RSA-2048 encryption. Mail dispatch is also encrypted using opportunistic TLS.

Backups at different locations

All data is stored redundantly and encrypted in high-security data centers. Automatic online backups prevent data loss in exceptional situations such as hardware failure or natural disasters.

ISO certified data centers

All data centers are ISO 27001 certified and provide the world's leading security standard. Data centers are protected by security guards, video surveillance, alarm systems, emergency power, security protocols, authentication rules, etc. 24 hours a day, 365 days a year.

Server in Germany

All Nordantech servers are located in Germany. Thus Falcon meets the requirements of the Federal Data Protection Act and the EU Data Protection Basic Regulation.

Delimited networks

Nordantech divides its systems into separate networks to better protect sensitive data. Systems that support testing and development activities are hosted on a separate network, separate from application systems. Network access to Falcon's production environment from open networks is limited.

System status always visible

To build trust with our customers and partners, the Falcon status page shows the availability of the software and all distributed systems over the last 12 hours, 7 days, 30 days and the whole year.

Resistance to attacks

IDS and IPS monitor all networks and/or systems for malicious activity and scan suspicious content. Heuristics-based network flow monitoring and integrated minimization of common and most common DDoS attacks ensure that the IT systems are resistant to attacks.

Notifications of unusual logins

The security of user accounts is enhanced by email notifications sent when logging in from an unknown device or Internet browser. These messages tell you from which device someone tried to log in and where the device is located. This allows Falcon users to respond immediately to suspicious logins.

By using this website, you agree to our cookie policy