Part of security is keeping data secure from outsiders, and part is segmenting the available features to just the employees that need access.
- Connection to servers only via encrypted SSL
 - Potentially sensitive information like a vendor TIN, encrypted when stored
 - Full role-based user permission structure
 - Each role defined from over 100 micro-access definitions
 - Each user can be assigned to multiple roles
 - Mandatory strong passwords for employees, supporting both symbol/punctuation based complexity (Jc@Sx7^XH{Jc) and sheer length complexity (purple9banana4longpassordsareeasytorememberandstillsecure)