Tilaa places great importance on data security and data sovereignty. We are convinced that personal data, as well as data in a business context, is valuable. That is why we ensure quality and safety by certifying our processes and services in accordance with internationally recognized standards.
Our entire set of processes and procedures is monitored, evaluated, and improved continuously. Our users can be confident that we are constantly developing our services in order to maintain quality and safety.
In the field of IT service management and information security, we comply with ISO 27001, ISO/IEC 9001 and ISAE 3402 type 1.
Your data is important and should never be up for grabs. To safeguard against this, Tilaa has acquired the ISO 27001 certification. ISO 27001 specifies standards for the implementation of security measures and audit mechanisms.
The infrastructure provided by Tilaa can be used as a foundation for a credit card processing platform. Even when you use the Tilaa platform for different purposes, this standard ensures a high level of security. A perfect addition to ISO 27001.
Tilaa is working continuously to improve customer satisfaction levels. With the ISO 9001 certification we have secured this process firmly in our organisation and with some great results: 98% of our customers would recommend Tilaa to others.
Our working methods and procedures are designed to keep data leaks to a minimum. Mobile data carriers such as USB sticks, memory cards, and external hard drives, for example, are not permitted within our organization or in the office.
Furthermore, all of our system connections are secured with 2048-bit encryption. With the help of this encryption (in-transit and at-rest), our and our users' data becomes unusable for third parties.
All Tilaa infrastructure is located within the borders of the European Union (EU). There are no direct connections to environments outside the Netherlands or Europe and ours are only accessible via a Dutch internet node.
All data hosted on our platform is protected by the Data Protection Directive of the EU, which regulates the processing of personal data. It is an important component of EU privacy and human rights law.
DDoS attacks are deliberate attempts by hackers to disrupt the traffic of a server, service, or network by overloading the target or surrounding infrastructure with non-legitimate (or seemingly genuine) data. The goal is to disrupt or possibly totally take down the service in issue, preventing people from using it (normally).
De you want to know how your business can prevent and respond to DDoS attacks?