Documentolog ilovasiIlovada ochish
logo

How is Information Security Ensured in Documentolog Solutions?

Documentolog takes the security and integrity of its clients' data very seriously. To this end, we continuously improve our infrastructure. What measures do we use to protect your data while you work in the system? We have outlined 7 key points.

3 daq.

08.11.2022

545

Gulzat Temirbayeva

Digital marketing manager

Documentolog takes the security and integrity of its clients' data very seriously.

What measures do we use to protect your data while you work in the system?

We have outlined 7 key points:

- Client digital signature and password data are not stored on Documentolog servers.

When signing a document in the Documentolog EDS, the path and password to the digital signature are requested, but this information does not reach Documentolog servers, as all signing occurs on the user's computer in their browser.

- Documentolog servers are protected against data loss.

All client file data is stored in three copies. Therefore, data availability is ensured even in the event of physical server hardware failure. If file servers fail, data will not be lost.

- The system's fault tolerance reaches 99%.

The system maintains its operability even after one or more components fail.

- Centralized event analysis and monitoring system (SIEM).

The SIEM system collects and analyzes logs from all instances. In case of identified risks, Documentolog administrators respond accordingly.
- Documentolog employees do not have access to client data.

Client data is transmitted via secure communication channels. Therefore, the information is not accessible to Documentolog employees.

- Document viewing is only available with permission.

Each client employee has access only to the information and documents they are permitted to see according to their structure or assigned role.

Two-factor authentication.

The system remembers each session and its metadata. When logging in from a new device or browser, the system requests an access code, which is sent to the email linked to the user's account. All login data is collected and displayed in the user's profile.

This is far from the complete list of measures we implement in our systems.

For more details, you can read the article.

Ijtimoiy tarmoqlarda havolani baham ko'ring:

Yana o'qing

25.12.2025

Halyk Bank и Documentolog объявили о стратегическом сотрудничестве в сфере цифровизации бизнес-сервисов

Halyk Bank и Documentolog объявили о стратегическом партнёрстве, в рамках которого запускается совместный цифровой сервис для корпоративного сегмента. Решение формирует единое цифровое пространство, позволяющее бизнесу работать с документами, заявками и банковскими сервисами в формате «одного окна».

05.12.2025

Documentolog запускает на рынок мультиагентную AI-платформу D8N — новый стандарт корпоративного управления

17 декабря 2025 года мы представим Documentolog 8N AI (D8N) — мультиагентную AI-платформу, которая формирует единое интеллектуальное пространство для работы с процессами, документами и корпоративными данными.

02.12.2025

Documentolog и UNICEF подписали меморандум о создании цифровой платформы UNICEF Jastary

UNICEF Kazakhstan и Documentolog подписали меморандум о цифровом партнёрстве на национальном UNICEF Youth Forum 2025 в Алматы. В соответствии с документом Documentolog получает статус Digital Partner for UNICEF и приступает к разработке новой цифровой платформы для молодёжи — UNICEF Jastary.