Part of security is keeping data secure from outsiders, and part is segmenting the available features to just the employees that need access.
- Connection to servers only via encrypted SSL
- Potentially sensitive information like a vendor TIN, encrypted when stored
- Full role-based user permission structure
- Each role defined from over 100 micro-access definitions
- Each user can be assigned to multiple roles
- Mandatory strong passwords for employees, supporting both symbol/punctuation based complexity (Jc@Sx7^XH{Jc) and sheer length complexity (purple9banana4longpassordsareeasytorememberandstillsecure)