Want to see who topped the 2019 Best Software Awards?
G2 Crowd User in Computer Software

Data Security Details

over 1 year ago

How is my data secured in Core? Can you provide some details?

Vendor Responses

Response by Core

over 1 year ago

Core’s servers are located within enterprise-grade hosting facilities that employ robust physical security controls to prevent physical access to the servers they house. These controls include 24/7 monitoring and surveillance, on-site security staff and regular ongoing security audits. Core maintains multiple geographically separated data replicas and hosting environments to minimize the risk of data loss or outages. If an unlikely event occurs, such as an entire hosting facility failure, we can switch over quickly to a backup site to keep Core and your business running. Our servers transmit data securely, across encrypted links.

Data is encrypted using industry-standard TLS (Transport Layer Security) with multiple layers of security controls including firewalls, intrusion protection systems and network segregation. Access to our data centers and servers is controlled and monitored 24/7 by humans and computers, thus protecting your personal and financial data. We also perform regular security audits. Your data is also secured at rest when it is stored on our servers, and encrypted when we transfer it between data centers for backup and replication.

No one has access to your organization’s data unless you invite them into your company file. You control who accesses what in Core. Subject to our privacy policy, we don’t share your personal or financial information unless you give us permission. Our customer support staff cannot access your information unless you invite them to help.

We provide standard access to the Core software through a login and password. We follow a strong password policy and ensure user authentication in every possible way.

Our Security Team proactively monitors security systems, event logs, notifications and alerts from all systems to identify and manage threats.