All information that you send to the system is protected using SSL protocol by default. If your security policy requires the use of VPN or IP Sec tunnel – we have option for this.
Data encryption
Senstive information are encrypted at rest. User have own safe place to encrypt data using own key. Additional to this user can mark selected data as private and it will be blurred on the screen.
Threat monitoring
We are constantly monitoring, testing and scan data in case off threats and security breaches. We use solutions from world leaders in application security.
Communication
We use SSL protocol communication, each user logs into the system using 2FA, which is required by default. It is also possible to enable SSO login using ActiveDirectory. Users focuses only on their works.
ACL, Roles
In addition to protection of login process, it is important to properly secure access to data at the application level. We took this to heart, access to data is based on a system of roles, defined individually with each organization.
In addition, access rules can be defined for individual records, which makes the solution extremely flexible.
Backup, SLA
All data is backed up and your retention policy is yours to choose. Our support team is available at several support levels based on business hours.
We monitor availability and send a monthly summary to your organization upon request*.