<img src="https://ad.doubleclick.net/ddm/activity/src=10024890;type=invmedia;cat=front0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1?" width="1" height="1" alt=""> Security in Fotoware: How we protect your data
Skip to content

Security in Fotoware

How Fotoware protects customer data across all products and services.

1. Security overview

Fotoware builds and operates all services with a security-first mindset. Our products run exclusively on Microsoft Azure, using its hardened cloud infrastructure, global compliance posture, and advanced security capabilities. All products and services follow the same core security controls.

2. Security governance

  • Centralized security program led by dedicated security leadership.
  • Organization-wide security policies covering access control, development, privacy, incident response, vendor management, and data protection.
  • Mandatory security and confidentiality training for all employees and contractors.
  • Enforcement of least privilege and strict disciplinary consequences for violations.

     

3. Cloud & infrastructure security

  • All Fotoware services operate on Microsoft Azure.
  • Data is stored and processed in regions aligned with the customer’s selected deployment location.
  • Azure-native controls such as network segmentation, firewalls, DDoS protection, managed services, and high-availability architectures are used throughout.
  • Built-in resilience and disaster-recovery capabilities cover three defined failure levels: server failure (automatic recovery within ~3 minutes), loss of a datacenter building (service recovery within ~3 hours), and full region loss (disaster-recovery restoration within ~3 days), aligned with Fotoware’s business continuity policies.

4. Data protection

  • All data in transit is encrypted using modern HTTPS/TLS.
  • All data at rest is encrypted using Azure-managed encryption.
  • Customer data is kept within the selected region and handled according to strict data minimization principles.
  • Backups follow Fotoware’s corporate backup policy and use Azure Recovery Services, with immutable backups taken at least every 24 hours. Daily recovery points are available for 7 days, and weekly recovery points are retained for approximately one month, enabling restoration more than 30 days back in case of disaster or customer error.
  • Backup processes are reviewed regularly for integrity and reliability.

5. Identity & access management

  • Role-based access control governs all internal and operational systems.
  • Least-privilege access is enforced for all administrative functions.
  • All privileged access is logged and audited.
  • Support personnel require explicit customer approval before accessing customer environments.
  • Strong authentication is required for all internal accounts with access to production systems.

6. Secure development & testing

  • Secure development lifecycle with mandatory code review, dependency management, and automated security scanning.
  • Privacy-by-design and security-by-design principles applied to all products.
  • Regular internal testing supplemented by external assessments or penetration tests when appropriate.
  • Controlled release and change management practices ensure safe deployment.

7. Operational security

  • 24/7 monitoring of infrastructure and services for security-relevant events.
  • A documented and regularly tested incident response plan governs detection, containment, remediation, and communication.
  • Logging and auditing applied across sensitive systems.
  • Vendor and subprocessor security reviews ensure alignment with Fotoware’s standards.

8. Compliance & privacy

  • Full GDPR compliance across all Fotoware services.
  • Data Protection Impact Assessments (DPIA) maintained and updated as needed.
  • Subprocessors used only for necessary operational functions and are vetted for security and privacy capabilities.
  • Customers retain full rights to access, export, erase, and manage their data.

9. Customer data lifecycle & rights

  • Customers may export or migrate their data at any time.
  • Upon contract termination, customer data is securely deleted following a defined process.
  • Fotoware personnel may only access customer data with explicit customer consent.
  • Guidance on metadata governance helps customers manage their own retention and deletion needs.

Have questions about security or compliance?

We’re here to help - get in touch with our team.