Tribia has delivered collaboration solutions to its customers since 2001, with the focus on stability and security. Extra emphasis has been placed on a safe operating environment. The physical operating environment is located in Norway and protected by Norwegian legislation.
All data in Interaxo are backed up twice a day. Deleted/modified files are saved for 30 days. The physical operating environment is divided between two anonymous data centres, and all information that is stored in Tribia’s collaboration solutions is mirrored in real time, making it easy to recover data in the event of a disaster.
The operating environment in Interaxo is protected against natural disasters and cyberattacks.
Increase log-in security using Tribia’s two-factor authentication. Two-factor authentication adds an extra level of security when logging in that means that you log in with something you know (i.e. your password) and something you receive (e.g. a code on the phone). With two-factor authentication, your account is more secure as it prevents others from logging in, even if they know your password.
Two-factor authentication works in much the same way as when logging in with BankID – you download a mobile app and log in/accept the login via a one-time code sent to the app.
The login to Interaxo is password protected for all users. When you invite new users, a correct email address must be added by the customer’s administrator. The email address becomes the new user’s username. Users invited to Interaxo can choose their own password. When choosing a password, it must have both upper- and lower-case letters as well as a number and a special character.
Tribia also allows you to federate with a customer’s AD for easy and secure user authentication. Please contact one of our salespersons for further information.
All information sent from Interaxo online is encrypted, including the username and password. None of our servers is exposed to the Internet, preventing access to underlying systems and external system users/passwords.
Tribia cooperates with several external security companies that regularly security test our systems. Black box and white box tests are performed, as well as Red Team tests. To ensure that both our applications and we as a company meet the strictest security requirements, we always listen to the recommendations we receive after completing the tests and ensure that the improvements are implemented.