Encrypted data, including credit card number Security

SSL Security

With the growing popularity of Internet, Extranet and Intranet, a growing number of organizations and individuals are using computer networks as an effective means for exchanging and distributing information. However, as the Internet is now regarded as one of the most attractive places to communicate in real time, those who wish to take advantage of their presence in these networks have to ensure the use of reliable means for the exchange of information.

The need for network security
Without the appropriate security measures, participants in processes of data transfer exchange have to worry about a set of threats - electronic fraud:
• Data Tampering - changes in bank account numbers during financial transaction;
• Eavesdropping - in which sessions are monitored in order to exchange information and take possession of confidential data;
• Identity Theft - when your personal information is stolen and used without your knowledge to commit fraud or other crimes.

The precautions for electronic fraud are especially important when one considers that the data is stored across multiple systems, when in transit.

There are technologies specifically designed to enable the creation of sessions for secure exchange of information. These technologies include SSL (Secure Sockets Layer) and Digital Certificates Public Key.


The technology available today in e-mail applications, information servers or browsers allow the use of safe and reliable services in an easy manner, without the need for participants in the exchange to be concerned about electronic fraud.

Basically, these protocols allow the establishment of secure sessions, through the use of cryptographic techniques such as encryption and digital signatures. These protocols allow authentication of data transferred (sender and recipient), allowing sensitive information (eg, number of credit card) to be shared but still inaccessible to third parties; additionally ensuring that the information exchanged between elements is not corrupted, accidentally or deliberately, without detection.

Key components in the establishment of secure sessions through SSL, S-HTTP or S/MIME are Digital Certificates. However, without authentic certificates, the protocols mentioned above offer no assurance.

Digital Certificates
The credentials used for network servers and browsers authentication through protocols such as SSL are called digital certificates. The digital certificate used in these protocols is based on standard X.509v3 and confirms the verification of the identity of the carrier and authorization, issued by a trusted third party, known in the world of electronic security as CA - Certificate Authority (CA - Certification Authority) or Certification Authority.

Making an analogy with the real world, a digital certificate can be viewed as a passport and the CA as the file identification. The latter verifies the identity of an individual, creates a trustworthy document which can be recognized by others, and issues a digital certificate for the individual to use.

The use of digital certificates, its internal constitution and degree of trust, varies according to individual operational needs and the Certification Authority’s policies for issuing digital certificates.


In order to ensure adequate data security of our customers we follow techniques and digital formats suitable for backups.
Backups are performed daily to ensure the preservation of all the client contents.

Powered by e-GDS CMS
Copyright © 2012 xyzt, s.a. All rights reserved
Co-Financed by: Co-Financing