Content corner

Business Technology That Works!

Security

Complete with features designed to deter, detect, and deny access to unauthorized parties, our system's data management policies and infrastructure provide you with the peace of mind of knowing that your data is completely replicated, backed up and available whenever you need it.

Role-based access control in our data center ensures users can only use data and application functionality that is related to their responsibilities, with mandatory employee background checks employed at all levels.

A strong 128-Bit Encryption, at the same level of encryption used by online banks, is provided for user login and all subsequent data. Continually enforce access with password complexity and password renewal rules. The system provides complexity rules to ensure passwords have a combination of numbers, letters and special characters. Your account is automatically locked out after unsuccessful login attempts. For additional access control, you can choose to receive support for multi factor authentication using a simple physical token to further minimize unauthorized access.

Utilize advanced security technology such as location-based IP address restrictions. The system application also adds further layers of security such as application-only access and restricting access to only certain IP addresses to provide complete confidence and peace of mind. IP address restrictions further minimize access to a user's account. Easily configure to ensure only specific computers and/or locations can access your system.

The application automatically locks when idle connections are detected to prevent unauthorized access. Any unauthorized attempts to access the data center are blocked, and unauthorized connection attempts are logged and investigated. Enterprise-grade anti-virus software guards against trojans, worms, viruses and other malware from infecting the software and applications. A complete audit trail ensures changes to every transaction are tracked with user login details and a timestamp.

The infrastructure incorporates multiple levels of redundancy to guard against failure. Redundant systems automatically assume processing without any interruption should any element fail. All production data is stored immediately to redundant locations. Hot backups give the system the ability to restore your data rapidly and reliably.

The system has met a host of audit and security standards including SSAE 16 (SOC 1), PCI-DSS and US-EU Safe Harbor framework. The system's security and risk management processes is modeled according to National National Institute of Standards and Technology (NIST) and ISO 27000 series of standards. Get stringent security certifications for your business applications that are otherwise expensive and onerous to achieve in-house.

Enjoy peace of mind knowing your data is automatically replicated and backed up all day, every day with a top-notch security to protect it.

Does this interest you? Read on.

top corners

Search TurnOnTech

top corners
Content corner