Quick Links
1 — Security Infrastructure
Multi-layer encryption
Tenant data isolation
Data residency configurable
Row Level Security of Data
24/7 security monitoring
Forensic audit trails
2 — Access Control
Granular Role-based permissions
Session management
Access logging
Automated revocation
Suspicious Login detection
IP Address whitelisting
3 — Encryption Standards
AES-256 encryption for project files
TLS 1.3 protocols
End-to-end encryption
Data-at-rest protection
Evidence chain protection
Secure API endpoints
Zero-knowledge architecture
4 — Network Security
DDoS protection
Web application firewall
Network segmentation
Traffic monitoring
Port security
Real-time threat blocking
6 — Monitoring & Detection
24/7 project access logs
Unusual export detection
Bulk download alerts
Data exfiltration prevention
Insider threat monitoring
Incident response
Audit logging
7 — Backup & Recovery
Daily P6 schedule backups
90-day claim history
Evidence versioning
Automated backups
Disaster recovery
Business continuity
99.9% uptime guarantee for SLA holders
8 — Framework
PIPEDA ready (Canadian privacy)
CCPA ready (California)
Construction industry standards
ISO 27001 aligned
Legal hold capable
Court-admissible logs
Regular audits