Enterprise security

All content created and stored inside the system is protected by a multi-layered security approach.

To guarantee the security of your content, we have applied rigorous methods and a range of security features.

Some of the system’s security features include:

  • data encryption

  • roles

  • flexible access control lists (ACL)*

  • authentication system


*An access control list (ACL) is a table that tells a computer’s operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges.