Security

Access Control
Access Control
Access Control
Users only see information to which they have access. That means, different users can only view, download, publish and/or print to where you grant access.
Users only see information to which they have access. That means, different users can only view, download, publish and/or print to where you grant access.

Data Storage
Data Storage
Data Storage
All personal data is stored encrypted and is hosted in secure, ISO 27001 compliant data centres in the UK.
All personal data is stored encrypted and is hosted in secure, ISO 27001 compliant data centres in the UK.

Application Security
Application Security
Application Security
You can set your own password. Our default security policies enforce a secure password. You can also set login parameters such as length and complexity of passwords, and you can also determine how frequently your users need to reset their password.
You can set your own password. Our default security policies enforce a secure password. You can also set login parameters such as length and complexity of passwords, and you can also determine how frequently your users need to reset their password.

Login
Login
Login
Independent security and penetration testing audits to ensure that personal information is always secure.
Independent security and penetration testing audits to ensure that personal information is always secure.

Data Ownership
Data Ownership
Data Ownership
You own and control the data entered on your systems by your employees or by us on your behalf. Simple.
You own and control the data entered on your systems by your employees or by us on your behalf. Simple.

Firewalls & IP Whitelisting
Firewalls &
IP Whitelisting
All servers are protected by separate hardware firewalls, which deliver high performance (as to not inhibit speed of service) and multi-threat protection.
Logins to your systems can be restricted only from your whitelisted IP addresses.
All servers are protected by separate hardware firewalls, which deliver high performance (as to not inhibit speed of service) and multi-threat protection.
Logins to your systems can be restricted only from your whitelisted IP addresses.

Proactive Monitoring
Proactive Monitoring
We proactively monitor our systems 24*7*365 for any vulnerabilities and unauthorised access attempts, thereby ensuring that your data is never at risk.
You also get a monthly report of active users on your systems. You can (with admin access) disable those users that are not needed any more. You can see logged in users and their IP addresses at any time by going to our security page.
Failed password attempts on your systems are also notified to you.
We proactively monitor our systems 24*7*365 for any vulnerabilities and unauthorised access attempts, thereby ensuring that your data is never at risk.
You also get a monthly report of active users on your systems. You can (with admin access) disable those users that are not needed any more. You can see logged in users and their IP addresses at any time by going to our security page.
Failed password attempts on your systems are also notified to you.
Catura®
Contact Us
+44 207 096 0015
Catura®
Contact Us
+44 207 096 0015
Catura®
Contact Us
+44 207 096 0015