The security of your data is important to us
Aptien is a cloud-based application hosted in a private, secure enterprise cloud environment.
Your data is stored only on our servers, not on your device. This means your information remains safe even if your computer is lost or damaged. Data is securely backed up in our cloud servers. All data transfers between your device and our servers are encrypted using SSL, ensuring that only you can access your information.
Data access is controlled by the administrator
As the administrator, you have full control over who can access your data. To keep your data secure, it’s essential that each user creates a strong password and keeps it confidential. Sharing passwords or using weak passwords can put your data at risk.
Each customer has their own separate database
Each customer’s data is stored in a separate database, not just a shared account in cloud storage. We manage all of this as part of your subscription. If preferred, you also have the option to host the application on your own servers.
Three layers of security
You don’t need to worry about managing servers, hiring specialists, or increasing costs—we handle it all. Your data is securely isolated from other customers’, providing a high level of protection.
Data center security
Our data centers provide physical security, protecting the servers and storage devices where your data lives. They guard against hardware failure, theft, fire, floods, and other disasters. Professional data centers offer a level of protection few companies can match. Staff at the data center do not have access to information about specific customers.
Data
centers also provide cybersecurity protections, including defenses
against internet-based attacks like DDoS. They ensure your data remains
safe and available at all times.
Virtual server security
We manage the virtual servers that run your applications to ensure reliable performance. We use trusted platforms like VMware or Hyper-V. The data center provides the physical hardware but does not have access to your virtual servers. Because your database is encrypted on the virtual server, we don’t have access to your raw data either.
Application security
The application controls data access at the user level. Only you and those you authorize can access your data. Communication between your devices and our servers is encrypted using HTTPS, and the stored database is also encrypted. Your data remains fully under your control.
We
select server locations based on what works best for you and to meet
legal requirements. For example, data for European customers is always
stored within Europe.
Security certifications of our data centers
The data centers we use hold the following certifications:
- AICPA SOC Reports
- HIPAA Compliance
- ISO 27001
- NIST 800-53
- PCI DSS Certification
- TIA-942
Your data is Stored in a Separate Database
Your account is not stored in a shared cloud environment. Instead, each customer has their own dedicated and isolated database. We handle all the setup and maintenance as part of your subscription. If you prefer, you also have the option to host the application on your own servers. The system protects data at the user level, so only you and the users you authorize can access it. Data transmitted between your devices and the server is encrypted using HTTPS, and the database where your data is stored is also encrypted. You have full control over your data at all times.
Data Backup for Business Continuity
We back up your data daily to keep your business running smoothly. You can restore your information from any point within the last 30 days.
Protecting Data Transmission with Encryption Against Cyber Threats
How do we secure your data?
- Data sent between our servers and your devices is encrypted using the latest TLS 1.3 protocol (with a minimum of TLS 1.2)
- User passwords are hashed and salted for added security
Data Access Is Controlled by the Admin
As the admin, you have full control over who can see and use your data. To keep your information safe, make sure every user has a strong password and keeps it private. Sharing passwords or using weak ones can put your data at risk.