Adeptia Connect provides a secure end-to-end encrypted environment for the data that is transferred and exchanged between the companies and its partners. Adeptia has multiple features that make the data secure right from the implementation until the transaction is complete. This further ensures that all the data transacted through Adeptia is secured and does not move out. Following is the list of security features of Adeptia Connect.
- Certificates
- Data Encryption
- Data Security
- User Authentication
- Role-Based Security
- User AuthorizationAuthorized Access
Anchor | ||||
---|---|---|---|---|
|
Adeptia Connect Connectors use certificates in order to ensure security while transmitting data across a communication protocol. Protocols such as FTPS, SFTP, HTTPS, and many others require the use of certificates in order to encrypt the data and to verify the digital signature of the application sending the data. The Certificate Component can use an existing key obtained from a certificate authority such as VeriSign or a key generated by Adeptia.
Secured On-Premise Installation in DMZ Environment
...
- Application Security
- Data Security
- Infrastructure and Hosting Security
Anchor Data_Security Data_Security
Data Security
Data_Security | |
Data_Security |
There is no data stored on Adeptia and the local copy of the data is deleted automatically when the data transfer is completed. Even when a temporary local copy of business data is stored on the hard drive, Adeptia supports encryption-at-rest to ensure that data is encrypted (explained above).
...
- Admin – IT Users
- Manage access
- Monitor User activity
- User Control
- Governance
- Admin can give access to business users
- Admin controls what connectors are available
Anchor |
---|
...
|
Adeptia Connect follows these guidelines for User Authorization.
...