Reksoft - Software Engineering & IT Outsourcing

Security and privacy


We know that delegating any part of your own software development is an intimate process. We proactively adhere to the strict industry security standards and carry out further improvements on a regular basis beyond the scope of standard practices. Our Information Security Management System is based on ISO/IEC 27001 and ISO/IEC 27002. 

Physical security and infrastructure

Infrastructure, which includes physical components, power components, telecom and the overall system, is reliable, state-of-art and offer very high availability. We have solid systems and processes for infrastructure control, upkeep and management.

We have comprehensive security in place at our buildings and at individual rooms to prevent unauthorized access, damage, or interference to the information systems as well as to protect equipment from physical and environmental threats.

  • Office security guard 24x7
  • Electronic access control system
  • Video surveillance
  • Intrusion alarm
  • Fire alarm
  • Secure server room
  • Backup power supply sources
  • Backup communication channel
  • Lightning protection
  • External backup facility

Information security

We have built an effective and standardized methodology for managing information security that is continually improved, to minimize risks before, during and after deployment.

  • NDA and Confidentiality agreements with clients and all employees
  • Access control: Active Directory
  • Firewalls for both external and internal  access
  • Media: controlled access and secure disposal
  • Encryption of VPN tunnels and emails
  • Automatic event log monitoring
  • Fault prevention tools
  • Isolated network segments, centralized antivirus control
  • Controlled Internet access via proxy server and traffic monitoring

IP protection

We have thoroughly developed our security systems, policies and institutionalization to guarantee that your intellectual property is always safe. We are highly conscious of security issues, respecting IP rights and adhering to all appropriate EU and US standards. We have established a European legal entities across Europe.

  • Corporate Legal Plan, includes
    • General Terms and Conditions
    • Code of Conduct
  • Corporate Continuity Plan, includes
    • Pandemic Plan
    • Infrastructure Recovery Plan 
  • Corporate Security Plan, includes
    • IT Security Policy
    • IP Security Policy
    • Physical Security Policy
  • Regular IP awareness workshops



The relationship with Reksoft has proved to be very fruitful. We get work done here that we don’t think we could get anywhere else.

Pavel Trakhtman,
Log Manager and Threat Manager Programs,
Alert Logic

All clients