How do we maintain the security of your ERP data?

The realm of computer security has many unknowns and as such, even the most secure systems can get compromised. However, it would be foolish to keep known security holes open for attack. Below are some of the steps taken to ensure ERPNext’s data’s security

Security in Database and connection

At Pixi Technologies we understand the relevance of the data that the user enters the system, that is why we devote special attention to store, encrypt and keep safe.

The data of each company in ERPNext is stored in a separate database. This avoids any risk of unwanted leaks to another company’s database.

The System use only secure HTTPS connections, where all the information that is transmitted from the web browser to the server is encrypted, reducing the risk of third parties intercepting and misusing the information. This is  the same technology used by online retailers and banks to secure internet transactions..

Automated Backups

With ERPNext, the backups are made everyday. Not only do we store backup copies of your data and files on our server, we also make encrypted backup copies on other servers located in a different datacenter. This means that your data is stored securely in several geographic locations around the world. 

We also offer the possibility of having daily automatic backups and on demand directly to your Dropbox account.
Dropbox offers additional layers of security, so you never have to worry. This safeguards business continuity should a disaster occur and the need to restore a backup arise.

Automated Backups

With ERPNext, the backups are made everyday. Not only do we store backup copies of your data and files on our server, we also make encrypted backup copies on other servers located in a different datacenter. This means that your data is stored securely in several geographic locations around the world. 

We also offer the possibility of having daily automatic backups and on demand directly to your Dropbox account
Dropbox offers additional layers of security, so you never have to worry. This safeguards business continuity should a disaster occur and the need to restore a backup arise.

Two Factor Authentication

To top it off, Two Factor Authentication (2FA) can also be optionally enabled which forces all system users to access the system through a 2nd level authentication with a token sent via email

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Share This