
Posted on
November 2, 2021
in
Learn About Our CMMS Security
CMMS Security Features
Rest Assured, It’s Secured – From Network Security to Authentication to Disaster Recovery
Schorp Group CMMS software, surrounding infrastructures and policies were built with system security, scalability, and compliance as a top priority.
NETWORK SECURITY YOU CAN RELY ON
- Complete Assurance begins with network security. We take preventive measures to protect the underlying networking infrastructure of our system. Top notch security creates a secure platform you can trust.
- Protection from unauthorized use. We offer a platform that is secure from unwarranted CMMS access, misuse, malfunction, modification, or destruction.
- Smart configuration options offer peace of mind. Customize authorization access levels based on needs. Rules allow managers to set visibility levels on assignments, approvals, and notifications within the application. Specifications allow forms that can be hidden or required.
AUTHENTICATION THAT PROVIDES ASSURANCE
- Users are protected throughout the application via a username and password option for each user. Additional authentication methods are available via a Single Sign On (SSO) option.
- System wide approvals for new users are required for added account management. Additionally session timeouts are in place to manage overall authentication and controls.
- Access groups can be put in place to limit user rights. User level role definition options enable dynamic group permissions that are associated with data manipulation or specific application level functions.
PHYSICAL SECURITY THAT PROTECTS CRITICAL CMMS DATA
- We use only state–of–the–art Internet hosting facilities to store your critical CMMS data. Our data center boasts the latest in round-the-clock security with on-site technical staff that actively managing, maintain, and support our network 24/7.
- We offer a cloud environment is designed to conform with best practices based off various application layers that are necessary. These layers include a networking layer, a web application layer, and a database layer.
- In the event of a data center or individual equipment failure, We have failover procedures in place to reduce downtime, speed recovery, backup data, and inform customers.
Contact Joe Schoeman and the Schorp Group Team for more information.
or Send us a message….. Click here
Innovation starts with a goal, then a plan
Related posts
April 10, 2026
Why Asset Management Is the Backbone of Operational Excellence
In today’s fast-paced operational environments — from healthcare facilities to industrial sites — the [...]
Read moreApril 2, 2026
Daily, Weekly & Monthly Maintenance Checklists
In any medical or dental environment, consistency is everything. From patient safety to equipment [...]
Read moreMarch 18, 2026
The Hidden Costs of Skipping Preventative Maintenance in Medical, Dental & Surgical Room
In a busy practice, it’s easy to focus on what feels urgent — patients, schedules, staff, and daily [...]
Read moreMarch 5, 2026
Reducing Maintenance Costs in Schools with a CMMS
Schools operate under tight budgets, yet their facilities must support hundreds—sometimes [...]
Read more




