Content in safe hands

Security Overview

From the ground up TERMINALFOUR Site Manager has been built to manage the largest and most popular information heavy websites, including banks and other financial institutions (Aviva, Permanent TSB), heavily trafficked e-commerce sites (Aer Lingus) and high profile government bodies (United Nations, Department of Foreign Affairs). We have ensured that security is our utmost priority.

Security testing is carried out by our in-house QA team as a standard part of our product development process and each client project development. Internally, all developments are undertaken to meet very high ISO security standards, with a standard set of tests being conducted, including cross site scripting vulnerability testing, SQ: injection testing and penetration testing. If a significant security issue is identified, the normal revision cycle is accelerated and an “immediate revision release” provided to clients. All clients impacted are identified and contacted by TERMINALFOUR with a recommendation to upgrade. Clients are offered the release for self installation or installation by TERMINALFOUR client support. On average TERMINALFOUR Site Manager is audited by 4-5 external agencies per annum as part of client security reviews. On each occasion we have passed all tests.

TERMINALFOUR Site Manager is 100% independent of the webserver of application server on which it operates. This allows you to take advantage of features such as SSL within the web or application server. Based on that functionality TERMINALFOUR Site Manager has commonly been installed behind a 128bit SSL certificate so that all data communicated between the editors of the system and the server is encrypted. Sites can also be published behind "https" to ensure that all end users visit a secure site.

TERMINALFOUR Site Manager also facilitates decoupled delivery. This static site generation approach involves the website being copied up as flat HTML files on a periodic basis (say once an hour) from a server other than the live host. This enhances security significantly as the live host machine is physically separated from the enterprise database store. Even if a hack attempt is successful, the entire site can be recopied up immediately thus limiting damage to a minimum.