Hero Image


Part of security is keeping data secure from outsiders, and part is segmenting the available features to just the employees that need access.

  • Connection to servers only via encrypted SSL
  • Potentially sensitive information like a vendor TIN, encrypted when stored
  • Full role-based user permission structure
  • Each role defined from over 100 micro-access definitions
  • Each user can be assigned to multiple roles
  • Mandatory strong passwords for employees, supporting both symbol/punctuation based complexity (Jc@Sx7^XH{Jc) and sheer length complexity (purple9banana4longpassordsareeasytorememberandstillsecure)