Frequently Asked Questions (FAQ)
Tradows provides you an active way of finding your customers and connecting with them. It is day-to-day transaction platform to simplify the trading process for you and your customers.
1. Viewing the inquiries from your exist customers and potential customers.
2. Managing your offered products and website.
3. Finding your potential customers in local or global market.
4. Sending your product promotion to the database of your potential customers.
5. Managing your purchase order to your suppliers and the purchase order from your customers.
6. Searching the products from your existing and potential suppliers.
With Tradows, you hold your sales result in your hand.
Among other security measures, Tradows provides:
Our production equipment is collocated in North America at a facility that provides 24-hour physical security, redundant electrical generators, redundant air conditioners, and other backup equipment designed to keep servers continually up and running.
The network perimeter is protected by firewalls and monitored by intrusion detection systems. In addition, Tradows monitors and analyzes firewall logs to proactively identify security threats.
Tradows leverages the strongest encryption products to protect customer data and communications, including 128-bit SSL encryption and 1024-bit RSA public keys. The lock icon in the browser indicates that data is fully protected from access while in transit.
When accessing the confidential data, users are required to have a valid username and password combination, which is encrypted via SSL while in transmission. Users are prevented from choosing weak or obvious passwords. An encrypted session ID cookie is used to uniquely identify each user. For added security, the session key is automatically scrambled and re-established in the background at regular intervals.
Our robust application security model prevents one Tradows customer from accessing another's data. This security model is reapplied with every request and enforced for the entire duration of a user session.
Internal Systems Security
Inside of the firewalls, the systems are safeguarded by network address translation, port redirection, IP masquerading, non-routable IP addressing schemes, and more.
Operating System Security
Tradows enforces tight operating system-level security by using a minimal number of access points to all production servers. We protect all operating system accounts with strong passwords, and production servers do not share a master password database. All operating systems are maintained at each vendor's recommended patch levels for security and are hardened by disabling and/or removing any unnecessary users, protocols, and processes.
Whenever possible, database access is controlled at the operating system and database connection level for additional security. Access to production databases is restricted to a limited number of points, and production databases do not share a master password database.
Server Management Security
All data entered into the Tradows application by a customer is owned by that customer. Tradows employees do not have direct access to the Tradows production equipment, except where necessary for system management, maintenance, monitoring, and backups. Tradows does not utilize any managed service providers. The Tradows systems engineering team provides all system management, maintenance, monitoring, and backups.
Reliability and Backup
All networking components, SSL accelerators, load balancers, Web servers, and application servers are configured in a redundant configuration. All customer data is stored on a database served by a database server cluster for redundancy. All customer data is stored on carrier-class disk storage using RAID disks and multiple data paths. All customer data, up to the last committed transaction, is automatically backed up on a daily basis.