Skip to content

Data Security and Accountability - Built In

SOLID supports a layered data security approach to protect your business system and customer data. We employ security features such as two-factor authentication, group and module access controls, one-time pins, locked IPs, text input whitelisting, antivirus scanning, audit trails and more.

Each layer of security is designed to ensure that you are able to remain operational, secure and compliant.

Enhance your business data security.

SOLID Data Security
Access Control - added layers for data security

SOLID Cloud Antivirus Scanning

Protect your SOLID database from malicious malware in email attachments and file uploads.

Layered Security

Data security mechanisms are built in layers from customer data encryption to firewall and network access controls.

Fully Auditable

All changes to system and customer data are recorded and stored to create a full data audit history.

Google Apps Authentication

Reduce the burden of login for your users, by enabling them to sign in with their Google account.

Define Roles & Responsibilities

Create access groups where users are only able to see and action parts of the system relevant to their role or authority level.

SOLID Cloud Antivirus Scanner

Safeguard your SOLID business system to remain operational, secure and compliant.

Our innovative antivirus scanner safeguards your SOLID database from malicious malware in email attachments and file uploads.

Automatically protect your SOLID database from both email attachments and files uploaded to SOLID. 

How SOLID Cloud Antivirus works

Configure & Manage within SOLID

You have a full view of what files have been received by your SOLID database, and their status. 

AI Assisted Detection

Protects you from Malware  and NSFW images containing adult, offensive or otherwise inappropriate images and language.

Dual Engine Scanner

This means that your files are scanned in parallel by a dual redundant scanner-engine, ensuring reliable and accurate results.

Real-time Definition Maintenance

Malware rules and virus definitions are maintained in real-time by leading antivirus providers. 

SOLID Access control | easy to use admin interface

Easy-to-Manage Roles and Responsibilities

Quickly and easily create, terminate, suspend or reactivate users either individually or in bulk. Users’ access rights are based on their roles or authority levels, and can easily be granted, denied or altered at any time.

Every action is recorded as part of your full audit history.

Each user’s account is highly detailed and includes:

  • Contact details
  • Ticket centre setting
  • SOLID access history
  • Customer management profiles
  • Module, Group and Meter access levels

See exactly who has what type of access and edit rights to maintain a high standard of data security and accountability.

Security is built-in

SOLID’s application security has been built in layers to ensure a great user experience coupled with data security.

Access control mechanisms and a fully auditable change log means that your data remains under your control at all times.

  • All sensitive data within your database is encrypted with a unique encryption key
  • Local and domain authentication uses LDAP and Active Directory
  • Password policies are configurable according to your own requirements
  • Definable security alerts notify specified parties via email
  • All browser sessions are http secured
  • Access is highly regulated by IP address, module access, sessions and account rights
  • SOLID utilises OWASP based java filters
  • Automatic access tracking builds a complete security audit trail
SOLID Access control | Application security layers
Blog post: Authentication And Sessions: How They Keep Your Data Safe

Authentication And Sessions: How They Keep Your Data Safe

Authentication is about verifying the identity of a user (or system) by confirming their credentials, while Session Management is about protecting a user's data during the period of time when a user is actively engaged with a system or website.
Read more
Blog post: Why Data Security Matters For Your Business

Why Data Security Matters For Your Business

Whether we like it or not, companies will always need to collect data. When customers hand over information (personal, financial and otherwise) - they expect your business to protect it.
Read more

4 Ways Audit Trails Can Protect Your Business

Audit trails are a detailed record of activity and changes made to data, system or applications. As you can imagine, in a world where businesses must prioritise data security - being able to access a fully traceable history of access and changes is a powerful tool against any potential threats.
Read more

Complete audit history and reporting

SOLID records every change to application settings and customer data to create a full audit history.

You are also able to view an individual user’s account, login and access history. All access logs and audits are easy to find and view. Having such a detailed report of all activity within your key business operational platform promotes accountability and ensures you have full control over your data.

Complete audit trail
Back To Top