Information Security Layers


Glassix provides various information security layers both default and optional.

Security Layers

MethodsAdditional InfoDefailt/Optional
SSLThe connection to this site via browser or API requires using a valid, trusted server certificate issued by Go Daddy Secure Certificate Authority - G2. The connection to this site is encrypted and authenticated using TLS 1.2 (a strong protocol), ECDHE_RSA with P-256 (a strong key exchange), and AES_128_GCM (a strong cipher).Default
Users Roles​Glassix provides it's users with various security roles and user types such as read-only, reporting, agent, manager, system administrator, API & bot - every role/type with it's limitations.Default
Access TokenAn Access Token is a short-lived credential used to authenticate your application or browser to Glassix. The appropriate role is embedded within your access-token to control your access.Default
Auto Idle LogoffLogging off the users after a default idle time of 4 hours (can be configured).Default
Failed Login Attempts LockLocking users after 5 wrong password inputs for 5 minutes.Default
reCAPTCHA v3reCAPTCHA v3 for login screen.Default
Malware scanAuto malware scan for attachments.Default
Images ReassembleGlassix is reassembling inbound images to avoid codec malware injection and malicious links. Reassembling images by changing the file format allows us to drop any malicious "codec" download path that is used to inject harmful code.Default
Audit LogsSecurity audit logs for all critical and sensitive processes.Default
Directory browsingDirectory browsing is disabled. All embedded content is provided with a unique issued token with an expiration date.Default
SupportOur support team can't access your data without a time-frame limited access provided by a user within your organization with manager or system administrator role.Default
Customer Data BackupsGlassix performs regular backups of Customer Data.
Customer Data is backed up both incremental and full-mode, retained redundantly across multiple availability zones, and encrypted in transit and at rest.
IP White listIP White list to approve access for both for users login & API calls.Optional
Password PolicySet your desired password policy for your users.Optional
Login 2FAUsers login 2FA with an SMS message.Optional
Data ScrambleData scramble via API or after ticket closure.Optional
File TypesGlassix supports in/outbound specific file types. Allowed file types can be updated.Optional
PDF ReassembleGlassix is reassembling PDF docs to avoid malicious links.Optional