Timz.Flowers uses modern, state-of-the-art security practices to protect your data and personal information. Learn more about our security commitments.
Timz.Flowers is committed to the security of our customers and their data. As a cloud-based company entrusted with some of our customers’ most valuable data, we are focused on keeping you and your data safe. Our customers entrust sensitive data to our care. Keeping customer data safe is our priority.
Secure and reliable infrastructure
We use Amazon Web Services (AWS) for secure and resilient hosting of data. This leverages multiple availability zones to redundantly store customer files. AWS data centers are monitored by 24/7 security, biometric scanning, video surveillance and are continuously certified across a variety of global security and compliance frameworks. Our staging and production environments are hosted by HETZNER in Germany and secured by IT-Experts and enhanced security policies.
Software Development Lifecycle (SDL) Security
Our Security Development Lifecycle (SDL) consists of a set of practices that support security and compliance requirements. Build more secure software and reducing the number of vulnerabilities.
We regularly scan our production infrastructure, applications and networks for vulnerabilities to identify potential risks that could impact our systems.
Data permission and authentication
We use role based access control and 2-Factor-Authentication for critical functions and cloud resources to provide fine-grained access management to resources.
All the Data we process is encrypted using SSL and encryption algorithms while the data is stored in our environment.
Frameworks and Regulations
Trust Center (coming soon)
In the near future we will launch a separate Trust page, where all relevant information regarding security, complince, transparency and protection of customer data will be published.
Independent verification of our compliance against global standards and national regulations
Subprocessors (Comming Soon)
View details about subprocessors by visiting the following link
Whitepaper (Comming Soon)
Timz.Flowers Security Whitepaper