{"id":7950,"date":"2019-01-30T12:49:34","date_gmt":"2019-01-30T12:49:34","guid":{"rendered":"https:\/\/support.loginextsolutions.com\/?p=7950"},"modified":"2026-01-28T09:43:43","modified_gmt":"2026-01-28T09:43:43","slug":"encryption-loginext","status":"publish","type":"post","link":"https:\/\/support.loginextsolutions.com\/index.php\/2019\/01\/30\/encryption-loginext\/","title":{"rendered":"Data Encryption at LogiNext\u2014In Transit and At Rest"},"content":{"rendered":"\n\n\n\t<div class=\"dkpdf-button-container\" style=\" text-align:left \">\n\n\t\t<a class=\"dkpdf-button\" href=\"\/index.php\/wp-json\/wp\/v2\/posts\/7950?pdf=7950\" target=\"_blank\"><span class=\"dkpdf-button-icon\"><i class=\"fa fa-file-pdf-o\"><\/i><\/span> Download PDF<\/a>\n\n\t<\/div>\n\n\n\n\n\n<p>At LogiNext, we prioritize the security and confidentiality of customer data. All sensitive interactions with our products\u2014such as API calls, user logins, and authenticated sessions\u2014are protected using industry-standard encryption mechanisms both in transit and at rest.<\/p>\n<h4 data-start=\"415\" data-end=\"442\">Encryption In Transit<\/h4>\n<p data-start=\"444\" data-end=\"708\">All data exchanged between clients and LogiNext systems (e.g., during login or API communication) is encrypted using SSL (Secure Sockets Layer). This ensures that no third party can access or tamper with the data while it&#8217;s being transmitted over the internet.<\/p>\n<h4 data-start=\"710\" data-end=\"734\">Encryption At Rest<\/h4>\n<p data-start=\"736\" data-end=\"827\">Sensitive information stored by LogiNext is encrypted or hashed depending on the data type:<\/p>\n<ul data-start=\"829\" data-end=\"1086\">\n<li data-start=\"829\" data-end=\"912\">\n<p data-start=\"831\" data-end=\"912\">User passwords are hashed using the SHA-256 cryptographic hash algorithm.<\/p>\n<\/li>\n<li data-start=\"913\" data-end=\"1086\">\n<p data-start=\"915\" data-end=\"1086\">Client-sensitive data (such as location data, personal identifiers, etc.) is encrypted using the AES-256 encryption standard, one of the strongest available today.<\/p>\n<\/li>\n<\/ul>\n<h4 data-start=\"1088\" data-end=\"1108\">Key Management<\/h4>\n<p data-start=\"1110\" data-end=\"1379\">Encryption keys are managed through our cloud partner\u2019s secure Key Management Services (KMS). These keys are safeguarded using FIPS 140-2 validated hardware security modules (HSMs), which comply with high-grade security standards to prevent unauthorized access.<\/p>\n<p><!-- Created with Elementor --><!-- Created with Elementor --><!-- Created with Elementor --><!-- Created with Elementor --><!-- Created with Elementor --><!-- Created with Elementor --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Download PDF At LogiNext, we prioritize the security and confidentiality of customer data. All sensitive interactions with our products\u2014such as API calls, user logins, and authenticated sessions\u2014are protected using industry-standard encryption mechanisms both in transit and at rest. Encryption In &hellip; <a href=\"https:\/\/support.loginextsolutions.com\/index.php\/2019\/01\/30\/encryption-loginext\/\">Continued<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[],"tags":[1189,3016,3015,3014,3013,3011,1325,1192,1191,1190,672,1188,1187,1186,1165,1164,1118,1061,676],"_links":{"self":[{"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/7950"}],"collection":[{"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=7950"}],"version-history":[{"count":8,"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/7950\/revisions"}],"predecessor-version":[{"id":27484,"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/7950\/revisions\/27484"}],"wp:attachment":[{"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=7950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=7950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/support.loginextsolutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=7950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}