Security aspects

QUIK Software ensures integrity and privacy of transmitted data, by providing secure connection between user workstations and the QUIK server. All information exchange between the server and the client is encrypted.

Broker tools for encryption and authentication

  • Authentication and encryption with standard TLS/SSL protocols
    Authentication may be done by name and password, or by X.509 certificate issued for a personal private key generated by its user.
  • Use of certified GOST algorithms generated by systems of cryptographic data protection CryptoPRO CSP and/or SignalCom SSLPro
    Authentication is done by X.509 certificate issued for a personal private key generated by a user. The key may also be stored on better protected external carriers — 'pendant' memory devices (JaCarta, eToken, ruToken, etc.).
  • Cryptographic tools by ARQA Technologies
    Public and private keys are generated by users and may be password protected. Private keys are kept separately from the software, for example, on a flash card. Authentication is done by public user key, encryption — by symmetric private key.

Other security tools

  1. various two-factor authorization mechanisms (RADIUS authentication, Windows domain authentication) with a PIN code sent to the user via email or, if Alert dispatch module is installed, to the user's mobile device via an SMS/push message;
  2. logging of all users’ transactions and text messages of;
  1. fixed IP-range available for connection to a specific terminal;
  2. individual security settings for each user, selective approach;
  3. transactions signed with a digital signature using certified cryptographic tools such as Message-PRO/Signal-COM, CryptoPro CSP.

External Cryptographic Tools

Security capabilities can be enhanced by using external certified cryptographic tools for creating digital signatures (sold separately).

Any transaction (a new order, request for cancelling an order, non-trade order) can be signed by its initiator with a digital signature that involves the following cryptographic tools certified by the Federal Security Service:

For Kazakh companies, support is provided for cryptographic tools of the following developers:
  • TUMAR-CSP (by “Gamma Technologies” Research Laboratory, Kazakhstan).
To top