Knowledge BaseSecurity Measures & Privacy Policy

Security Measures & Privacy Policy

Sana Commerce 9.3
Your connector

Security Measures

All web sites that are storing sensitive data, like personal and payment information of the clients, are attractive targets to hackers. A compromised web site can have the long-term consequences for both, customers and merchants.

Security maintenance is essential for Sana Commerce. Thus, we keep security quality of the Sana Commerce product on the highest level. Although, there is no single solution to eliminate all security risks, there are many precautions which you can take to safeguard your web store from potential threats.

While no system can be 100% invulnerable to every threat, we made the Sana Commerce solution as safe as possible. We implemented a variety of security measures to maintain the safety of your customers' personal information and access to the Sana Commerce solution. A Sana web store and Sana Admin are protected by multiple layers of security to prevent unauthorized access.

Sana Commerce security was analyzed using various automated and manual techniques, including analysis of OS Command Injection, SQL Injection, Untrusted Initialization, CRLF Injection, Cross-Site Scripting, Cryptographic Issues, Directory Traversal, Insufficient Input Validation, Code Quality and Information Leakage.

System integrity, reliability and precaution increases consumers' confidence when handling online sales. The coding standards used by our developers follow best practices to maximize the software efficiency and provide secure online sales. Sana Commerce takes precautions to safeguard a web store from potential threats and ensures:

  • Online sales integrity.
  • Robust and checked for integrity payment gateway. All guidelines provided by the gateway providers are observed and applied.
  • Subjected to security checks web store and Sana Admin. Adequate precautions are taken to ensure that the code structure of the web store and Sana Admin is not vulnerable to code injections (like HTML and SQL injections).
Knowledge BaseSecurity Measures & Privacy Policy