ProofCafe Security Policy

Your data is secure with Zilicus. The ProofCafe software runs on a proven infrastructure designed to provide maximum security performance and reliability. The security and integrity of your data are integral to the success of your company and the reputation of our business hence we take security very seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure.

For ProofCafe website and software application, we use Amazon Web Services to provide its customers and partners with state-of-the-art perimeter, network, server, application and data security to ensure privacy and availability.


  • ProofCafe website, application, database, mobile apps are hosted in world class secure server environment (hosted and professionally managed by Amazon Web Service, a recognized leader in application hosting) that uses a dedicated firewall to prevent interference with outside intruders. Amazon’s AWS (Amazon Web Services) cloud architecture is certified as SAS70 Type II facility & it has also achieved ISO 27001 certification – known for reliable security measures. Please visit for more details.
  • We backup data is mirrored regularly to another distinct servers !
  • We are 100% committed to security and investing in the best technology and infrastructure

Server Security

  • All devices and software are protected by encrypted passwords and accessible only through encrypted communication paths

  • Application security model prevents customer data cross-over and ensures complete customer data segregation and privacy

Application Security

Encrypted Password

  • User authentication is controlled via unique and valid username and password combination and password is stored as encrypted data.

Role Based Access

  • All access within ProofCafe is permission based – there are different types of roles available and these types of roles define the level of access to set of data such as projects, proofs, comments, etc. Users can only access data that they have been given permission to access. For more details please refer to help guide of respective ProofCafe application.

256-bit SSL

  • ProofCafe application is 256-bit SSL encryption-enabled. What this means is that the data that you send between your computer and the ProofCafe server is encrypted. Its like sending a coded message. If you bank online or use ecommerce sites then you have already used SSL. SSL will make it very difficult for unauthorized people to view information traveling between your computer and the ProofCafe server.

  • Above security model is reapplied with every request and enforced for the entire duration of the session. 256 bit AES High Grade Encryption and Secure Socket Layer (SSL) protects your data using both server authentication and data encryption.

  • ProofCafe does not use “cookies” to store other confidential information and have implemented advanced security methods based on dynamic data and encoded session IDs.

  • Virus Scanning. Traffic coming into ProofCafe Servers is automatically scanned for harmful viruses using state of the art virus scanning protocols which are updated regularly.

Data Security & Backup

  • Application security model prevents customer data cross-over and ensures complete customer data segregation and privacy

  • Customer data is segmented from the Application layer providing additional security buffers

  • System-wide backups of all data to disk are performed daily

People Processes

Designing and running data center infrastructure requires not just technology, but a disciplined approach to processes. This includes policies about escalation, management, knowledge sharing, risk, as well as the day to day operations.

  • Select Employees. Only employees with the highest clearance have access to our data center data. Employee access is logged and passwords are strictly regulated. We limit access to customer data to only a select few of these employees who need such access to provide support and troubleshooting on our customers’ behalf.

  • Audits. Audits are regularly performed and the whole process is reviewed by management

If you still have questions or concerns, please contact us at support [at]; we would be happy to address your concerns.