FAQ: Just how secure are our systems?
Taking actionable steps to address our clientโs FAQโs, we addressed the question: Is IPROTECT AC Secure?
A: Yes, IPROTECT AC 10.3 is the most secure version we’ve ever created.
In relation to security, here are some more highlights of the key improvements:
- API Changes (Logi): We’ve made changes to our API, specifically related to login procedures to enhance the security of user authentication.
- System User Enhancements: You can now demand the renewal of passwords in connection with expiry dates, allowing you to stay on top of your security procedures. This feature is configurable via the Global system setting, where you can specify the number of days after which passwords expire and need to be changed.
- Mobile App Access Token: Our security level is comparable to that of online payments or online banking. Per card reader you can decide how the mobile device should be used, for example, unlocking before presenting to a card reader or by presenting a locked device to a card reader. This streamlines the access process while maintaining robust security measures.
- Trails – Authorization of user group and PC settings: Our system adjusts user rights based on workstation and login locations, enabling control, accommodating employees in multiple locations or departments, and enhancing security measures.
- Threat Management Level: Leveraging this functionality, you can prioritize security measures and proactively adapt to potential threats such as whether to use a pin code, change normal access to remote access through the intervention of a control room (video verification) or block certain groups of people, for example, visitors.
Here is a word from Product Manager Michel Binnekade;
“Security by design is how we work and develop; it is a way of life. Our goal is to ensure that the systems always meet the latest security requirements. If you have chosen us, you don’t have to worrt about security. We work continuously to optimize and improve the security of our systems.”