Security
Birst_Arrow
Birst_Arrow
Birst_Arrow
Birst_Arrow
Birst_Arrow
Birst_Arrow
Birst_Arrow
Birst_Arrow
Home33

Home

Business Intelligence

Products Overview

Why It’s Better

Technical Overview

How It Works

Solution Levels

Security

FAQs

security

Birst takes data security very seriously

Managing your data is at the heart of what Birst does. For this reason, ensuring that your data is transferred and stored securely is a top priority. To accomplish this, we have implemented a broad array of state-of-the-art security measures including:

Data Encryption

  • VeriSign SSL Certificate encryption of sensitive information during all online operations including data transfers
  • PCI-compliant credit card processing


User Authentication

  • Access only with a registered e-mail address and password combination
  • Passwords are stored only in a hashed form - they cannot be recovered, only reset


Physical Security

  • Birst uses the leading hosting provider, Rackspace, for its data centre, please see www.rackspace.com for additional information
  • Data centre access is limited to data centre technicians
  • Biometric scanning for controlled data centre access
  • Security camera monitoring at all data centre locations
  • 24/7 onsite staff provides additional protection against unauthorised entry
  • Physical security audited by an independent firm


System Security

  • System installation using hardened, up-to-date OS with security patches installed
  • Redundant firewalls to help block unauthorised system access
  • Data protection with managed backup solutions
  • Network-based intrusion detection systems (IDS)
  • Continuous risk assessment and security consultation by security professionals


Operational Security

  • All employees trained on documented security and privacy procedures
  • Access restricted to authorised personnel only, according to documented processes
  • Systems access logged and tracked for auditing purposes
  • Documented change-management procedures
  • Independently audited disaster recovery and business continuity plans for data centre


Database Security

  • Access to database is limited to authorised hosts and personnel only


Application Security

  • Applications developed in alignment with security protocols
  • Continuous review and testing of application security
Birst_security

Birst has passed the rigourous security audits of leading financial services companies and corporations in the Fortune 500. If you would like more detailed information, please read our Security White paper or Contact Us with additional questions.

[Synergy Holdings Inc] [Privacy Policy] [Contact Us] [Principle Profile] [Business Intelligence] [Epicor - We Guarantee our Results] [IBS Integrator] [LeanThinking] [Liquid Planner] [Find  Accounting Software] [Unlimited Storage and Back Up]