Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To have a secure end-to-end environment for data exchange between two parties (Company and its partners), Adeptia undertakes a detailed scanning of security features and third party Jars to ensure there is no critical or major vulnerability. Adeptia uses OWASP venerability vulnerability scanning technique for scanning its product. The table below contains the links to security scanning reports and their summary for your reference.

...