OUR TOP PRIORITY IS TO PROTECT YOUR DATA
All our solutions come with an integrated security approach encompassing a range of technical safeguards and complying with
well-known data security standards to protect the integrity of your data.
USER ACCESS CONTROL
EVENT AND AUDIT TRAILS
Function Access Control
Data Access Control
Limited access to certain types of data such as allowing a manager to see salary data of only direct employees, but to view schedules of employees in all departments. Such rules can be related to people, positions, relations or custom definitions.
Users are authenticated when an encrypted cookie is issued to their device. This cookie contains an encrypted token tied to their specific device.
The application design passes all users access through a single authentication path while segmenting interface file transfers to a separate quarantine before processing.
-User / Password –
Standart application security
-PIN TOKEN –
Pin Number Authorization
-Multifactor Authentication –
Password Hash Funtion
SHA256 With Obfuscator Key
File Encription : PGP Encryption
Database Encryption : RSA KEY
Secure Channel : sFTP
Access to the application is controllable by NIST SP 180-118 password rules, expiries, and device limitations and more. Passwords are stored in a single location and encrypted by one way hash meaning that no one is ever able to retrieve a password. A variety of configurable rules are implemented to ensure passwords are secure including:
Workplaze creates audit trails and event logs for all transactions as a component of the application architecture that cannot be disabled. Log access and usage including data types, time changed, user, data affected, old & new data.
Data encryption secures data against interception and unauthorized viewing. SunFish provides multiple levels of data encryption:
DATA AT REST
File store in secure file server
Confidential data like payroll is
encryption with AES256 and Unique
Database Backup File is Encrypted
with RSA Key
DATA IN TRANSIT
PGP encryption (RSA2048)
Web traffic transmission over Secure
Sockets Layer (SSL) Using only
strong security protocols Transport
Layer Security (TLS)
DATA IN USE
User / Password
Single Sign On
Role Based access right control all
of funtion, data, and action