Security

Xfix Global Limited | Enterprise-Grade Security Framework


Last Updated: March 22, 2026 | Version 2.0

Protecting Your Data Across Our Global Ecosystem

X

Xfix Global Limited

Building Software, Empowering Business

At Xfix Global Limited, security is not an afterthought - it is embedded into every layer of our software engineering process. We are committed to protecting your data with enterprise-grade security measures that meet the highest industry standards. Our security framework encompasses infrastructure security, application security, data protection, access controls, and continuous monitoring to ensure the confidentiality, integrity, and availability of your information across all our platforms.

This Security page outlines our comprehensive security practices, policies, and commitments. We believe in transparency and provide this information to help you understand how we protect your data and what you can do to enhance your own security posture when using our services.

99.9%

Uptime SLA

AES-256

Encryption at Rest

24/7

Security Monitoring

ISO 27001

Aligned Standards

1

Infrastructure Security

Our infrastructure is built on enterprise-grade hosting services with multiple layers of security controls to protect your data.

Hosting Infrastructure
  • Powered by TrueHost with dedicated servers and VPS
  • Linux-based environments: Ubuntu, AlmaLinux, Rocky Linux, Debian
  • Windows 2019 servers for specialized applications
  • Cloudoon nameservers (ns2.cloudoon.net, ns3.cloudoon.org)
Data Center Locations
  • Strategic locations across Europe, USA, and Kenya
  • Tier III and Tier IV certified data centers
  • 24/7 physical security with biometric access controls
  • Redundant power, cooling, and network connectivity
2

Data Security & Encryption

We employ industry-leading encryption standards to protect your data both in transit and at rest.

In-Transit Encryption

All data transmitted between users and our servers is protected using TLS 1.2 and TLS 1.3 protocols, ensuring secure communication across the internet.

At-Rest Encryption

Data stored on our servers is encrypted using AES-256 encryption standards. Database encryption, file system encryption, and encrypted backups ensure comprehensive protection.

Key Management

Encryption keys are managed using hardware security modules (HSMs) with strict access controls and regular key rotation policies.

Backup Encryption

All backups are encrypted with separate key management and replicated across multiple geographic regions for disaster recovery.

3

Access Controls & Authentication

We implement strict access controls to ensure that only authorized personnel and users can access sensitive data.

Role-Based Access Control (RBAC)

Least privilege principle applied to all employee and system access. Permissions are granted based on job function and regularly reviewed.

Multi-Factor Authentication

MFA is required for all administrative access and available for all user accounts. We support authenticator apps, SMS, and hardware tokens.

Single Sign-On (SSO)

Enterprise clients can integrate with their existing identity providers using SAML 2.0 or OIDC for seamless authentication.

Session Management

Automatic session timeouts, concurrent session controls, and idle session termination to prevent unauthorized access.

4

Security Monitoring & Incident Response

Our security operations center provides 24/7 monitoring and rapid incident response capabilities.

24/7 Security Monitoring

Real-time threat detection, intrusion detection systems (IDS), and security information and event management (SIEM) with immediate alerting.

Log Management

Centralized logging with 12-month retention for audit trails, forensic analysis, and compliance reporting.

Vulnerability Management

Weekly automated vulnerability scans, quarterly penetration tests, and continuous security assessments of all systems.

Incident Response Plan

Documented incident response procedures with dedicated response team, regular drills, and defined communication protocols.

5

Application Security

Security is integrated into our software development lifecycle from design to deployment.

Secure Development Lifecycle

Security requirements, threat modeling, secure coding practices, and peer code reviews integrated into every development phase.

Regular Testing

SAST, DAST, and manual penetration testing conducted regularly to identify and remediate vulnerabilities before deployment.

OWASP Compliance

Adherence to OWASP Top 10 security best practices and regular testing against common vulnerability patterns.

CI/CD Security

Automated security gates in our CI/CD pipeline ensure vulnerabilities are caught before reaching production environments.

6

Compliance & Certifications

We maintain compliance with major regulatory frameworks and industry standards.

ISO 27001

Information Security Management System alignment

GDPR

EU data protection compliance for user privacy

Kenya Data Protection Act

Full compliance with Kenyan data protection regulations

PCI DSS

Payment Card Industry Data Security Standard compliance

HIPAA

Healthcare data protection (where applicable)

SOC 2 Type II

Service Organization Control audits (in progress)

7

Data Backup & Disaster Recovery

Comprehensive backup and recovery strategies ensure business continuity and data protection.

Automated Backups

Daily automated backups of all databases and file systems with 90-day retention for rapid recovery.

Geographic Distribution

Backups replicated across multiple data center locations (Europe, USA, Kenya) for disaster resilience.

Recovery Objectives

RTO: 4 hours for critical systems | RPO: 24 hours maximum data loss for routine operations.

Regular Testing

Quarterly disaster recovery drills validate backup integrity and restoration procedures.

8

Your Security Responsibilities

Security is a shared responsibility. Here's how you can help protect your account and data.

Strong Passwords

Use unique, complex passwords for your account. Avoid reusing passwords across multiple services.

Enable MFA

Multi-factor authentication adds an essential layer of security. We strongly recommend enabling it.

Log Out After Sessions

Always log out when accessing your account from shared or public devices.

Report Suspicious Activity

Immediately report any unauthorized access or suspicious activity to security@xfixglobal.com.

9

Responsible Disclosure

If you discover a security vulnerability in any of our platforms, we encourage responsible disclosure.

Vulnerability Reporting

Please report security vulnerabilities to security@xfixglobal.com. We will investigate and respond promptly. We appreciate your help in keeping our platforms secure.

Acknowledge Receipt

Within 48 hours

Initial Assessment

Within 5 business days

Resolution Timeline

Based on severity level

Contact Our Security Team

For security-related inquiries, please reach out to our dedicated security team.

security@xfixglobal.com

dpo@xfixglobal.com

For privacy-related concerns, please refer to our Privacy Policy or contact privacy@xfixglobal.com.