Leading Security Standards
ICONICS uses encryption, certificate authentication, user and system encrypted passwords, and obfuscation to provide the highest level of security demanded for today’s systems. ICONICS employs a multi-step review process across many phases of the software development lifecycle and utilize a multi-phase development lifecycle that includes unit testing, integration testing, system testing, and performance testing. Security testing is conducted on a per-feature basis for new functionality, including stress tests for security and controls.
Additionally, ICONICS employs tight security measures during the development stage by protecting its code digitally and requiring specific credentials to access different parts of the code. The ICONICS development team also maintains and regularly reviews a security threat model for the ICONICS software. ICONICS also offers a secure option on its product installations that provides a locked-down and secure environment. Lastly, for ease of installation, ICONICS makes any system extremely flexible for the system administrator so that all system-to-system and system-to-client interface parameters can be adjusted to work within a customer’s secure infrastructure.