Forensic Notes is highly integrated with
Microsoft Azure, a leader in online secure
hosting which meets a broad set of
international and industry-specific standards
Security is not a product, but a process. It’s more than designing strong cryptography into a system, it’s designing the entire system such that all security measures, including cryptography, work together.- Bruce Scheiner - Security Guru
* Disclaimer: Forensic Notes makes no claims to being ISO, HIPPA, FedRAMP of FIPS 140-2 compliant.
Microsoft Azure meets a broad set of international and industry-specific compliance standards
Forensic Notes is employing all best practices in securing their application and the data that exists within it.- Mike Parsons - Security Evangelist and Mentor
Symmetric Encryption utilizes a single encryption key for both encryption and decryption.
Asymmetric Encryption, commonly known as Public Key cryptography, utilizes a private and public key.
Video Source: https://www.professormesser.com/