Skip to content
acumatica blog header image 2
Janet Talley5/3/19 12:22 PM3 min read

Acumatica Security: Top 10 Reasons Acumatica Stands Alone

Acumatica Security: Top 10 Reasons Acumatica Stands Alone
4:46

Security has become more of a concern as more data is stored electronically, and hackers come up with new ways to acquire information. How you protect your data is crucial, not just in protecting your business, but also safeguarding the privacy of your clients and vendors. Here are the top reasons that Acumatica security features protect your data:

1. You Control Where Data is Stored

Unlike many web-based cloud accounting software or ERP applications, with Acumatica, you are in full control of where your data is kept and processed, and you are in total control over who has access to maintain and use your system. Furthermore, Acumatica can be installed at your location or through a Hosting or Cloud Services provider. Hosting providers retain 24/7 staff in physically secure data centers that exceed what most businesses can provide internally - and often at a lower cost. For some organizations, however, data and processing must be performed internally at locations mandated by governmental or corporate policy. With Acumatica, the choice is yours.

2. Strong User Authentication

User logins can be limited from specific IP addresses. You can define how long user passwords must be and how often they must be changed. In addition, you can require users to set strong passwords or define your password algorithm. The user's browser session times out automatically after a period of inactivity, which you determine.

3. Multi-Factor Authentication

In addition to options to strengthen user authentication, you can also utilize multi-factor login from new devices or all devices, where the user receives a mobile push notification, text, or email with a uniquely generated code. Multi-factor authentication a new security feature of Acumatica and still is not widely used in many industries. It puts your business ahead of the game for security protocols.

4. Data is Kept on the Server

Customer, vendor, employee files, transactions, wiki pages, and all other data remain on your server. As users complete forms, only the small bits of data they actually see are transferred to the web browser - and even then, only for a brief instant. Once forms are completed, no data remains
in the browser and data is never stored on the user's computer.

5. Encrypted Communication

To transfer information between Acumatica and the user's browser, Acumatica uses https; the same encryption technology used by banks to ensure no one can 'listen in' on your data. With Acumatica security features there is no performance penalty for using https.

6. Database Encrpytion

To protect especially sensitive information, Acumatica encrypts certain fields such as credit card numbers, social security numbers, names, and rates of pay within the SQL database. Consequently, this protects you in the event that a backup copy of your information is lost or stolen. You can designate whatever fields you wish to be encrypted in this manner.

7. Menus Display Only Authorized Screens, Reports, & Pages

User menus display only the applications and pages authorized for each person. This also reduces the complexity of the application for individuals and speeds learning.

8. Role-Based User Security

In Acumatica, security policies can be assigned by Role which reduces the number of security settings and the chance for error. Coupled with an unlimited number of Roles that can be created, there is no limit on the types of security rights granted.

9. Re-validation Within A Single User Session

Each transmission between the browser and the application server is re-validated from an encrypted key.

10. Restriction Groups

Finally, Acumatica security features allows us to setup Restriction Groups, where a group of users has access only to certain records within the system. For instance, we can restrict by Salesperson which customers they can see. We can also restrict General Ledger accounts that managers can see, so that when they are working with budgets or financial reports, they will only see the accounts that pertain to their department, and the transactional information that exists in those accounts. Restriction groups can be setup across items, vendors, customers, general ledger accounts, and more.

As you can see, there are plenty of reasons to rely on the Acumatica security protocols that are available. There are many aspects involved in safeguarding your data, but Acumatica offers some top-of-the-line protection and so many customization's to suit your particular business needs.

To learn more about Acumatica or to schedule a FREE demo or software consultation, Contact us today!

RELATED ARTICLES