MenuToggle Menu

Network & ProtoPie Player App Security

This page provides information about our network security protocols for ProtoPie Enterprise Cloud environments, including firewalls, intrusion prevention systems, and antivirus & malware systems.

Network Security Controls

We use WPA2 encryption to protect the perimeter of our wireless network environment. This encryption protocol effectively safeguards against unauthorized wireless traffic.

To ensure a consistent time reference across our infrastructure, a synchronized time-service protocol like NTP (Network Time Protocol) is utilized for all systems.

Given the architecture of our Enterprise Cloud services, which utilize Docker containers and AWS's virtual network, we do not operate within a physical network environment. As a result, the following procedures are not applicable to our network security measures:

  • Vulnerability/penetration network testing.
  • Infrastructure vulnerability scans.
  • Access to LAN/WAN/Internet provision.

Firewalls & IPS

To fortify our network against potential vulnerabilities, we rely on the cutting-edge Palo Alto Web Firewall. This solution not only incorporates powerful anti-malware features but also boasts an intrusion prevention system (IDS/IPS) that diligently inspects all network traffic for threats, regardless of ports used.

By harnessing the capabilities of the Palo Alto Web Firewall, we eliminate the need for a separate malware program to be installed on our AWS EC2 instances. This firewall solution encompasses a wide array of security aspects, including:

  • Perimeter and boundary security solutions to safeguard our network boundaries.
  • Protection against various common attack vectors, such as Man in the Middle (MitM), Denial of Service (DoS), IP spoofing, and port scanning.
  • Additional controls that enhance security measures, such as capacity management, packet analysis, and sniffing.
  • Robust defense mechanisms to thwart attacks targeting our virtual infrastructure.

Antivirus & Malware

We employ the following protection systems to safeguard against malware, phishing, and viruses:

  1. Bitdefender: Our end-point USB control and antivirus monitoring solution, Bitdefender, actively defends against potential threats, providing comprehensive protection for our systems.
  2. Palo Alto Web Firewall: Network traffic within our EC2 instances is routed through the Palo Alto Web Firewall. This robust firewall solution not only incorporates intrusion detection systems (IDS) but also features anti-malware mechanisms, ensuring the highest level of security for our network.

To stay ahead of emerging threats, our virus definitions undergo regular updates every 3 hours.

We prioritize the security of all components within our solution, including iOS, Windows, Ubuntu (Linux), and web browsers such as Internet Explorer (IE) and Safari. Through diligent patch management, we ensure that all security patches are applied within 60 days of their release. For critical vulnerabilities, we expedite the patch deployment process, ensuring that patches are implemented within 30 days of their release.

Our firewall configuration follows a whitelist-based IP and port control approach, ensuring that only authorized traffic is permitted.
To maintain the effectiveness of our antivirus protection, we verify that antivirus definitions are up to date on users' endpoints using the ID management console.

The disabling of security software settings on endpoints is currently not permitted. This ensures that our systems remain protected at all times.

Penetration Tests

We conduct comprehensive penetration tests on an annual basis to evaluate the security of our systems and identify any potential vulnerabilities.

To further enhance the security of our solution, we conduct regular application security scanning prior to implementing significant changes. We give the highest priority to the findings from these scans, ensuring they are promptly addressed during the development process.

ProtoPie Player App Security

ProtoPie Player is a companion app to ProtoPie Studio, providing users with a seamless experience to view and test prototypes on their iOS, iPadOS, and Android devices.

The ProtoPie Player app has successfully undergone the rigorous approval processes of both the Google Play Store and the App Store. This ensures that the app meets the necessary security standards and adheres to the platform guidelines.

To enhance security, the ProtoPie Player requires user permission to run, ensuring that users have control over their app experience and data.

To maintain a secure mobile app environment, we conduct thorough penetration tests on an annual basis. These tests are designed to identify and rectify any potential bugs or vulnerabilities, ensuring that the ProtoPie Player remains reliable and secure for our users.

Back To Top