Jaxxstein security

We use industrial-strength security to protect the database. The best way to think of our Jaxxstein security is like an extinct volcano with a crater full of rain water. Around the base we have a firewall which repulses SQL insertions, cross-site scripting, malware, trojans, worms,viruses, brute force, zero days and timing attacks (phew).

Half way up the side of the volcano, we have a second fortification (sanitization and validation).

The database is in the center of the crater surrounded by a vast lake. Data in and out of the database have to travel on our special barges (parameterization). In addition, all data whether in transit or stored are heavily encrypted.

Jaxxstein Passwords | PIN & Password protection Online