Promoting Cyber-Security
In today's complex and technology-dependent world, safeguarding IT systems from cyber threats is of utmost importance.
Security was built into our design. Whether you're working solo, for a large organization, or anything in-between, thousands of people trust us with their mission critical data.
Account security
Our software supports two-factor authentication, password complexity requirements, password expirations and limited incorrect login attempts, etc., in order to keep accounts secure and to comply with your organizations user security policies.Data protection & encryption
We use secure 256-bit Advanced Encryption Standard (AES), the strongest method of AES encryption available, to protect your data at rest. We also use Secure Sockets Layer (SSL) and Transport Layer Security (TLS) to protect data in transit from your workstation and our servers.File sharing and permissions
Advanced sharing controls like line specific access, and expiration dates for temporary users, along with easy revocation of shared files help ensure that only the right people have access.Data breach security
We keep our systems safe from bad actors, with vulnerability testing, enterprise detection and response capabilities. Our systems are regularly tested for security vulnerabilities, and hardened to enhance security and protect against attacks.Compliance
Our software meets the strictest of enterprise regulations for data handling, including GDPR compliance and prevention of Personal Identifiable Information from being requested or stored.Infrastructure
Our systems utilize Amazon AWS fault-tolerant infrastructure with servers located in data centers across multiple regions within the United States.Stay protected with BAPLIE Viewer Online