Reksoft - Software Engineering & IT Outsourcing

Security and privacy


We know that delegating any part of your own software development is an intimate process. We proactively adhere to the strict industry security standards and carry out further improvements on a regular basis beyond the scope of standard practices. Our Information Security Management System is based on ISO/IEC 27001 and ISO/IEC 27002. 

Physical security and infrastructure

Infrastructure, which includes physical components, power components, telecom and the overall system, is reliable, state-of-art and offer very high availability. We have solid systems and processes for infrastructure control, upkeep and management.

We have comprehensive security in place at our buildings and at individual rooms to prevent unauthorized access, damage, or interference to the information systems as well as to protect equipment from physical and environmental threats.

  • Office security guard 24x7
  • Electronic access control system
  • Video surveillance
  • Intrusion alarm
  • Fire alarm
  • Secure server room
  • Backup power supply sources
  • Backup communication channel
  • Lightning protection
  • External backup facility

Information security

We have built an effective and standardized methodology for managing information security that is continually improved, to minimize risks before, during and after deployment.

  • NDA and Confidentiality agreements with clients and all employees
  • Access control: Active Directory
  • Firewalls for both external and internal  access
  • Media: controlled access and secure disposal
  • Encryption of VPN tunnels and emails
  • Automatic event log monitoring
  • Fault prevention tools
  • Isolated network segments, centralized antivirus control
  • Controlled Internet access via proxy server and traffic monitoring

IP protection

We have thoroughly developed our security systems, policies and institutionalization to guarantee that your intellectual property is always safe. We are highly conscious of security issues, respecting IP rights and adhering to all appropriate EU and US standards. We have established a European legal entities across Europe.

  • Corporate Legal Plan, includes
    • General Terms and Conditions
    • Code of Conduct
  • Corporate Continuity Plan, includes
    • Pandemic Plan
    • Infrastructure Recovery Plan 
  • Corporate Security Plan, includes
    • IT Security Policy
    • IP Security Policy
    • Physical Security Policy
  • Regular IP awareness workshops



We have been working with Fujitsu Technology Solutions since 2006 and in that time we have performed five complex projects, much of which implemented using Microsoft SharePoint Server. Our search for a project subcontractor involved analysis of many software engineering services companies. We were looking for a suitably-sized partner offering reasonable prices, expertise in the relevant technology and a commitment to cooperation, and Reksoft answered all these criteria.

Harald Bernreiter,
Director, IT Systems
Fujitsu Technology Solutions

All clients