CMMS Security Features

Rest Assured, It’s Secured – From Network Security to Authentication to Disaster Recovery

Schorp Group CMMS software, surrounding infrastructures and policies were built with system security, scalability, and compliance as a top priority.

NETWORK SECURITY YOU CAN RELY ON

  • Complete Assurance begins with network security. We take preventive measures to protect the underlying networking infrastructure of our system. Top notch security creates a secure platform you can trust.
  • Protection from unauthorized use. We offer a platform that is secure from unwarranted CMMS access, misuse, malfunction, modification, or destruction.
  • Smart configuration options offer peace of mind. Customize authorization access levels based on needs. Rules allow managers to set visibility levels on assignments, approvals, and notifications within the application. Specifications allow forms that can be hidden or required.

AUTHENTICATION THAT PROVIDES ASSURANCE

  • Users are protected throughout the application via a username and password option for each user. Additional authentication methods are available via a Single Sign On (SSO) option.
  • System wide approvals for new users are required for added account management. Additionally session timeouts are in place to manage overall authentication and controls.
  • Access groups can be put in place to limit user rights. User level role definition options enable dynamic group permissions that are associated with data manipulation or specific application level functions.

PHYSICAL SECURITY THAT PROTECTS CRITICAL CMMS DATA

  • We use only state–of–the–art Internet hosting facilities to store your critical CMMS data. Our data center boasts the latest in round-the-clock security with on-site technical staff that actively managing, maintain, and support our network 24/7.
  • We offer a cloud environment is designed to conform with best practices based off various application layers that are necessary. These layers include a networking layer, a web application layer, and a database layer.
  • In the event of a data center or individual equipment failure, We have failover procedures in place to reduce downtime, speed recovery, backup data, and inform customers.

Contact Joe  Schoeman and the Schorp  Group  Team for more information.
or Send us a message….. Click here

Innovation starts with a goal, then a plan