ikonomikal SECURITY FEATURES
1. SSL (Secure Sockets Layer)
2. Microsoft Azure Firewall
3. IP Address Lock
4. Identity Based Security
5. User Invitations
6. Role Based Security
7. API/Webserver Based Data Access
8. Audit Trail Logs
9. Self Service Database Restore
10. Geo Database Restore
11. External Database Backup Storage
2. Microsoft Azure Firewall
3. IP Address Lock
4. Identity Based Security
5. User Invitations
6. Role Based Security
7. API/Webserver Based Data Access
8. Audit Trail Logs
9. Self Service Database Restore
10. Geo Database Restore
11. External Database Backup Storage
1. SSL (SECURE SOCKETS LAYER)
ikonomikal uses the same encryption technology implemented by most banks.
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.
2. MICROSOFT AZURE FIREWALL
ikonomikal uses a firewall similar to what you have installed on your computers, but in a larger scale. We manage this feature for you as part of your package.
A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.
A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.
3. IP ADDRESS LOCK
Almost any information can be accessed from the internet.
The IP Address Lock in ikonomikal is able to minimize data breach or leak by allowing you to specify IP Addresses that are allowed to connect.
When a user from outside requests access to the company, that user provides the administrator his/her IP Address. The administrator shall enter the IP Address in the IP Address Set. The IP Address Set then is entered in System User if concerning only the user or in the System User Groups if more than one user or with specific access only. The IP Address Lock can also be implemented at the Company, Branch, and Department Levels.
4. IDENTITY BASED SECURITY
In ikonomikal, we always use session keys to communicate with our API/Webserver.
A user is required to have an account with a valid email address and password to log in. A session key is generated in place of the user password and this is what gets transmitted over the internet.
All session keys are unique per user.
SIGN UP AND LOGIN PAGE
5. USER INVITATIONS
Everyone is free to sign up in ikonomikal, but will not be able to connect to any company.
A user must be invited by the company administrator and then he/she has to accept the invitation.
UNINVITED USER
INVITED USER
6. ROLE BASED SECURITY
Your identity is always validated by ikonomikal. Identities are also given a role by way of the System Users and System User Groups.
The System Users and System User Groups are a set of rules or authorities granted to you. It describes what you can and can’t do.
The System Users and System User Groups are a set of rules or authorities granted to you. It describes what you can and can’t do.
7. API/WEBSERVER BASED DATA ACCESS
In ikonomikal, you are allowed access to your data only after your identity is authenticated and role is identified.
A direct connection to your database is not allowed for safety and to preserve data integrity.
Instead, the API/Webserver uses your role to identify what you can do and can’t do and connects direct to your database and perform actions on your behalf.
8. AUDIT TRAIL LOGS
ikonomikal logs Activities, Data or Information such as:
1. Save
2. Add
3. Delete
4. Data
5. Close
6. Post
7. Drop
8. Set to Post
9. Unset to Post
10. Account Entries
11. Income and Expense Entries
12. Retained Earnings Entries
13. File Attachments
14. Document Notes
15. Print
16. BI Datasource
17. BI Chart
18. BI Dashboard
19. BI Excel
20. BI Word
21. BI Scheduled
22. Program Que
Legend: BI = Business Intelligence Program
2. Add
3. Delete
4. Data
5. Close
6. Post
7. Drop
8. Set to Post
9. Unset to Post
10. Account Entries
11. Income and Expense Entries
12. Retained Earnings Entries
13. File Attachments
14. Document Notes
15. Print
16. BI Datasource
17. BI Chart
18. BI Dashboard
19. BI Excel
20. BI Word
21. BI Scheduled
22. Program Que
Legend: BI = Business Intelligence Program
9. SELF SERVICE DATABASE RESTORE
SELF SERVICE DATABASE RESTORE is available with a restoration gap of 30 minutes. The data to restore must be within the past 14 days.
10. GEO DATABASE RESTORE
Backups on the same Data Centers where your database is located may
fail. We also backup every database and store it miles away. This backup has 1
Hour difference and can only be restored at the time of last backup.
11. EXTERNAL DATABASE BACKUP STORAGE
You can use this to study the data structure, make offline data analysis, or just to have that feeling of security where you are in close proximity with your database.
You may be interested to know (please click to browse):
- Is 3rd Party Integration Possible in Ikonomikal?
- How Robust is Ikonomikal?
- What is Ikonomikal SSL Security Level?
- Company website of Ikonomikal
- Ikonomikal software site
- What is Ikonomikal?
No comments:
Post a Comment