security

We take this quite seriously, so that you don't need to lose sleep over this.

briefcase_02.gif

Access Control

 

Users only see information to which they have access. That means, different users can only view, download, publish and/or print to where you grant access.

Data Storage

 

All personal data is stored encrypted and is hosted in secure, ISO 27001 compliant data centres in the UK.

data-512.gif
lock_512pxGREY.gif

Application Security

Independent security and penetration testing audits to ensure that personal information is always secure.

Login

 

You can set your own password. Our default security policies enforce a secure password. You can also set login parameters such as length and complexity of passwords, and you can also determine how frequently your users need to reset their password.

user.gif
badge-icon-png-0.gif

Data Ownership

You own and control the data entered on your systems by your employees or by us on your behalf. Simple.

Firewalls & IP Whitelisting

 

All servers are protected by separate hardware firewalls, which deliver high performance (as to not inhibit speed of service) and multi-threat protection.

Logins to your systems can be restricted only from your whitelisted IP addresses.

Security-Security-Checked-icon.gif
monitor.gif

Proactive Monitoring

 

We proactively monitor our systems 24*7*365 for any vulnerabilities and unauthorised access attempts, thereby ensuring that your data is never at risk.

You also get a monthly report of active users on your systems. You can (with admin access) disable those users that are not needed any more. You can see logged in users and their IP addresses at any time by going to our security page.

Failed password attempts on your systems are also notified to you.