Data and information security is our top priority! We continuously strive to enhance information security by safeguarding the infrastructure and product, maintaining operational security, securing and improving software development, and performing threat-mitigation activities and external penetration tests. Protecting and ensuring the confidentiality, availability, and integrity of your data is crucial to our business.
Server and data permissions are managed through IAM (Identity and Access Management) solutions to ensure that only the appropriate users can access the different data objects throughout the spend management solution.
The cloud storage databases manage server-side encryption keys, where data is encrypted using best practice encryption algorithms. For all communication services, both server-to-client and server-to-server, TLS (Transport Layer Security) are enforced with encryption certificates.
All your data is processed by secure and reliable cloud providers.