![black logo of fu3e](https://static.wixstatic.com/media/87073d_35288016e92e45a4a684a03653b30504~mv2.png/v1/fill/w_316,h_307,al_c,q_85,enc_avif,quality_auto/87073d_35288016e92e45a4a684a03653b30504~mv2.png)
![n shape black line](https://static.wixstatic.com/media/87073d_2ca0f215026d436f8b3395a93af2993e~mv2.png/v1/crop/x_56,y_0,w_202,h_82/fill/w_227,h_92,al_c,lg_1,q_85,enc_avif,quality_auto/87073d_2ca0f215026d436f8b3395a93af2993e~mv2.png)
With benefits including enhanced functionality, rich customisation options, and high compatibility with other applications, that's fu3e.
Security.
fu3e.security
Trusted by security-focused businesses.
![logo of aws](https://static.wixstatic.com/media/87073d_2f34bd6be8274ecd8890b91c1013b943~mv2.png/v1/fill/w_980,h_586,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/87073d_2f34bd6be8274ecd8890b91c1013b943~mv2.png)
![logo of Laravel](https://static.wixstatic.com/media/87073d_4822809a263d4b79bde3e3206b1e5ad1~mv2.png/v1/fill/w_980,h_1019,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/1200px-Laravel_svg.png)
![logo of Oauth](https://static.wixstatic.com/media/87073d_ef8b53152ab042969edf49706189eec4~mv2.png/v1/fill/w_512,h_514,al_c,q_85,enc_avif,quality_auto/87073d_ef8b53152ab042969edf49706189eec4~mv2.png)
![logo of JS](https://static.wixstatic.com/media/87073d_f5fef76ec2c745c69d718fc2ece2b2d8~mv2.png/v1/fill/w_500,h_500,al_c,q_85,enc_avif,quality_auto/87073d_f5fef76ec2c745c69d718fc2ece2b2d8~mv2.png)
![logo of php](https://static.wixstatic.com/media/87073d_a25df38a1aec47539eb1971e8cbdb70d~mv2.png/v1/fill/w_711,h_384,al_c,q_85,enc_avif,quality_auto/87073d_a25df38a1aec47539eb1971e8cbdb70d~mv2.png)
We use proven, industry leading technologies such as Laravel and AWS.
Technologies utilised by fu3e are robust, reliable and future-proof.
Trusted
technologies.
![logo of Green Earth](https://static.wixstatic.com/media/87073d_b3c611889bac465fa3c597d3c32f90c9~mv2.png/v1/fill/w_980,h_926,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/87073d_b3c611889bac465fa3c597d3c32f90c9~mv2.png)
![logo of AWS](https://static.wixstatic.com/media/87073d_1b566d26213b4095aafe3507fb4732ba~mv2.png/v1/fill/w_460,h_510,al_c,q_85,enc_avif,quality_auto/87073d_1b566d26213b4095aafe3507fb4732ba~mv2.png)
Multiple
availability zones.
Each AWS Region has multiple availability zones. For fu3e we use the AWS eu-west-2(London) region and utilise 2 of the avaiability zones.
![logo of safari](https://static.wixstatic.com/media/87073d_abe5a55014934a2194f469eaed51a98a~mv2.png/v1/crop/x_0,y_1,w_448,h_614/fill/w_538,h_737,al_c,lg_1,q_90,enc_avif,quality_auto/87073d_abe5a55014934a2194f469eaed51a98a~mv2.png)
![logo of Bing](https://static.wixstatic.com/media/87073d_5e8ef592f94b459a8a9c3c98f6d344a8~mv2.png/v1/crop/x_0,y_6,w_1024,h_811/fill/w_980,h_776,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/87073d_5e8ef592f94b459a8a9c3c98f6d344a8~mv2.png)
Platform
Supported browsers
![Logo of Google](https://static.wixstatic.com/media/87073d_799bbd58f5a44804979d64350c445995~mv2.png/v1/crop/x_21,y_142,w_470,h_370/fill/w_512,h_403,al_c,lg_1,q_85,enc_avif,quality_auto/87073d_799bbd58f5a44804979d64350c445995~mv2.png)
Information.
-
Chrome from v80
-
Edge from v80
-
Safari from v13
-
(Android not supported)
-
ISO27001 and ISO9001 certified
UK Cyber Essentials scheme
Least privilege policy
Segregated databases
Load balancers
Immutable logs
Leading edge security.
![n shape black line](https://static.wixstatic.com/media/87073d_2ca0f215026d436f8b3395a93af2993e~mv2.png/v1/crop/x_56,y_0,w_202,h_82/fill/w_227,h_92,al_c,lg_1,q_85,enc_avif,quality_auto/87073d_2ca0f215026d436f8b3395a93af2993e~mv2.png)
![black logo of fu3e](https://static.wixstatic.com/media/87073d_35288016e92e45a4a684a03653b30504~mv2.png/v1/fill/w_316,h_307,al_c,q_85,enc_avif,quality_auto/87073d_35288016e92e45a4a684a03653b30504~mv2.png)
As a security-focused software provider, fu3e follows leading edge security best practices to ensure that its services and data are reliable, secure, and scalable at all times.
DDoS protection
Intrusion detection & ACL rules
Regular 3rd party penetration testing
Cryptography and storage
Secure access management
Backup, retention and recovery
Vulnerability management and APIs