Security Approach
Business i uses Amazon Web Services (AWS) to host its services and customer data. AWS is widely recognized as an industry leader in cloud security and infrastructure reliability.
Our team continuously updates Business i services and applications to ensure a secure cloud-based productivity platform. With decades of experience in building enterprise software and managing online services, we follow stringent industry security and compliance standards to protect customer data.
Encryption to Protect Sensitive Data
Business i ERP encrypts and decrypts sensitive data using proven and reliable encryption techniques.
- Data is protected during transmission
- Data stored on servers is also securely encrypted
- Measures are in place to prevent data loss and unauthorized access
Security is embedded into every stage of development through a Security Development Lifecycle (SDL) approach. From initial planning to deployment:
- Threat models are created during the design phase
- Potential security risks are carefully analyzed
- Automated tools and peer reviews are used to identify and validate security issues
Two-Factor Authentication for High Security
Business i ERP supports Two-Factor Authentication (2FA) to add an additional layer of protection.
In addition to your username and password, an authentication token is required to access your account, significantly reducing the risk of unauthorized access.
Monitor User Activity with Audit Logs
Audit logs help track who performed what action and when within the system.
- All critical user activities are logged
- Actions such as record creation, modification, and deletion are audited
- Enables proactive monitoring of employee and system activity
This helps organizations maintain accountability and make informed decisions.
Frequent and Reliable Data Backups
All customer data is continuously backed up across multiple servers.
- Ensures data availability in case of hardware failure
- Protects data during unexpected events or natural calamities
- Helps maintain business continuity without data loss