Skip to main content

Data Protection

ADITO is designed with a strong focus on data security. The platform incorporates several security principles to ensure the confidentiality, integrity, and availability of data.


Core Security Principles

ADITO's security architecture is based on four key pillars:

  • Confidentiality: Enforced through user authentication, password policies, and configurable complexity rules.
  • Integrity: Ensured by using signed and certificate-protected application components to prevent unauthorized code execution.
  • Availability: Achieved through load balancing, distributed infrastructure, and platform independence.
  • Encryption: All data transmissions are encrypted to protect against unauthorized access.