OUR TOP PRIORITY IS TO PROTECT YOUR DATA

All our solutions come with an integrated security approach encompassing a range of technical safeguards and complying with
well-known data security standards to protect the integrity of your data.

USER ACCESS CONTROL

EVENT AND AUDIT TRAILS

SECURE HOSTING

DATA ENCRYPTION

DISASTER RECOVERY

REDUNDANCY

APPLICATION SECURITY

The workplaze application itself is functionally secured by configuring user group access to functions and data independently and with granular access control.

Function Access Control

Configuration user access to allow read/ update/add/delete access to functions and the ability to create more granular control levels

Data Access Control

Limited access to certain types of data such as allowing a manager to see salary data of only direct employees, but to view schedules of employees in all departments. Such rules can be related to people, positions, relations or custom definitions.

Users are authenticated when an encrypted cookie is issued to their device. This cookie contains an encrypted token tied to their specific device.

  • Unable to open from two devices,
  • Expires after configurable period,
  • System verifies users’ validity during each transaction.

The application design passes all users access through a single authentication path while segmenting interface file transfers to a separate quarantine before processing.

-User / Password –
Standart application security

-PIN TOKEN –
Pin Number Authorization


-Multifactor Authentication –
Google Authentication
Email
Mobile Apps

-SSO –
SAML 2.0
OAUTH 2.0
ADFS
Azure AD

Funtiion / Feature Access Right Data Authentication Right Action Access Right Workflow Approval Right

Password Hash Funtion
SHA256 With Obfuscator Key
(Unique)


File Encription : PGP Encryption
Database Encryption : RSA KEY
Secure Channel : sFTP

Access to the application is controllable by NIST SP 180-118 password rules, expiries, and device limitations and more. Passwords are stored in a single location and encrypted by one way hash meaning that no one is ever able to retrieve a password. A variety of configurable rules are implemented to ensure passwords are secure including:

  • Password complexity requirements,
  • Password reset frequency with no password reuse,
  • Blocking user and IP after repeated failed attempts.

Workplaze creates audit trails and event logs for all transactions as a component of the application architecture that cannot be disabled. Log access and usage including data types, time changed, user, data affected, old & new data.

DATA PROTECTION

Data encryption secures data against interception and unauthorized viewing. SunFish provides multiple levels of data encryption:

  • SSL 256 bit data encryption for data transferred over the Internet;
  • Database field encryption for confidential data in the database;
  • Encryption of data back-ups;
  • Optional required VPN connection to servers.

DATA AT REST
-File Encryption-

File store in secure file server

-Database Encryption-
Confidential data like payroll is
encryption with AES256 and Unique

Database Backup File is Encrypted
with RSA Key

DATA IN TRANSIT
-File Encryption-
PGP encryption (RSA2048)


-Data Transimission-
Web traffic transmission over Secure
Sockets Layer (SSL) Using only
strong security protocols Transport
Layer Security (TLS)

DATA IN USE
-Application Authentication-

User / Password
Biometric
Multifactor
Single Sign On
Pin Token

-Application Authorization-
Role Based access right control all
of funtion, data, and action

“Partnering with Humanica has allowed us to roll out various digital initiatives over the years. It has greatly improved efficiency and provides great visibility to our operation.”

You may also like to explore

Blog: Analytics Trends

Predictive Analysis Article

Analytic Features Video

It takes courage to move forward, to implement
changes or lead into a new direction. We support
you to take the next step.