Your Commercial Data Under Reliable Protection

We understand that financial and production data is your business's most valuable asset. Our priority is to ensure its complete confidentiality and integrity.

Key Principles

A multi-level approach to protecting your information.

Connection Protection

HTTPS protocol, certificate from Sectigo. Encryption standard SHA256WithRSA . The server does not accept connections via outdated protocols (SSLv3 and lower).

DB Isolation and Encryption

Physical isolation on Hetzner servers (Germany, Finland). Data is distributed. Table and field names are encrypted (requiring a separate key file).

Access Control

SHA256 hash + salt (protection against rainbow tables). Access via JWT (similar to OAuth 2.0). Instant blocking via Telegram bot.

Backup and NDA

Daily backup. Access to infrastructure only for 3 employees under NDA.

Confirmed Security

Our security certificates are regularly checked and updated. We use advanced algorithms to ensure data integrity during transmission.

Trusted by Major Browsers
CERTIFICATE CHAIN REPORT
  • app.bimpsoft.com resolves to 135.181.3.236
  • The certificate should be trusted by all major web browsers.
  • The certificate was issued by Sectigo.
  • The hostname (app.bimpsoft.com) is correctly listed.

Server Certificate

Common name: app.bimpsoft.com
Signature Algorithm: sha256WithRSAEncryption
Issuer: Sectigo RSA Domain Validation

Chain of Trust

1. Sectigo RSA Domain Validation
Valid until: 2030
2. USERTrust RSA Certification Authority
Location: New Jersey, US
3. Root: AAA Certificate Services
Signature: sha384WithRSAEncryption

Our Technical Foundation

Details of security architecture.

Servers and Infrastructure

  • Hosted in EU: Dedicated Hetzner servers in Germany and Finland (open servers).
  • Logical Isolation: Company data is distributed across several servers.
  • Structure Encryption: Table and field names are encrypted. They require a key file which is stored separately. Without it, understanding relationships is impossible.

User Authentication

  • Password Hashing: SHA256 + "salt" for protection against "rainbow table" attacks.
  • Short-lived Tokens (JWT): Algorithm similar to OAuth 2.0. Short lifespan of the access token minimizes risks in case of compromise.
  • Instant Blocking: Mechanism for instant employee blocking via Telegram bot is present.

Administrative Control

Our guarantees against data loss and unauthorized access.

Backup

Daily automatic backup. Copies on a remote server for quick recovery.

Personnel Control

Access to infrastructure (servers, DB) is limited to only 3 key employees.

Legal Guarantee (NDA)

Every specialist with access has signed a strict Non-Disclosure Agreement (NDA).

In Development

Security Enhancement Plans

We constantly improve the protection system, implementing the latest cybersecurity standards.

bcrypt

Transition to an artificially slowed password hashing algorithm for maximum protection.

Authorization Microservice

Separate service with extended access control functions.

Activity Analysis

Tracking suspicious activity (e.g., login from different countries).

2FA

Two-factor authentication for an additional level of identity verification.

Do You Have Additional Security Questions?

We are ready to discuss every aspect of your company's data protection in detail.

Order Consultation
Bimp Logo

Thank you for your request!

A manager will contact you shortly