security
We take this quite seriously, so that you don't need to lose sleep over this.
Access Control
Users only see information to which they have access. That means, different users can only view, download, publish and/or print to where you grant access.
Data Storage
All personal data is stored encrypted and is hosted in secure, ISO 27001 compliant data centres in the UK.
Application Security
​
Independent security and penetration testing audits to ensure that personal information is always secure.
Login
You can set your own password. Our default security policies enforce a secure password. You can also set login parameters such as length and complexity of passwords, and you can also determine how frequently your users need to reset their password.
Data Ownership
​
You own and control the data entered on your systems by your employees or by us on your behalf. Simple.
Firewalls & IP Whitelisting
All servers are protected by separate hardware firewalls, which deliver high performance (as to not inhibit speed of service) and multi-threat protection.
​
Logins to your systems can be restricted only from your whitelisted IP addresses.
Proactive Monitoring
We proactively monitor our systems 24*7*365 for any vulnerabilities and unauthorised access attempts, thereby ensuring that your data is never at risk.
​
You also get a monthly report of active users on your systems. You can (with admin access) disable those users that are not needed any more. You can see logged in users and their IP addresses at any time by going to our security page.
​
Failed password attempts on your systems are also notified to you.
​
​