Application Infrastructure
Ensuring your data is protected from unauthorised access is our priority. For further information, please see our Due Diligence page.
Penetration Tested
To provide further peace of mind that your data is secure the FinCalc software suite has undergone a rigorous penetration testing process undertaken by Arcturus Security a company accredited by CHECK, CREST, NCSC and Cyber Essentials
Secure Data Storage
We use a secure UK based Microsoft Azure SQL Database System on which to store your data, which is encrypted at rest and in transit. Microsoft Azure & Azure Storage offer the most comprehensive set of certifications and attestations of any cloud service provider
Separate Database for Data Storage
Option to have a company specific Isolated Managed Environment, whereby separate instances of the Azure SQL Database, Azure storage for reports and Azure web application are setup dedicated to your company
At additional cost
Application Controls
Manage your application settings, ensuring they comply with your IT policies.
User Security Profiles
Control the level of access different users have to your system by assigning User Profiles to each. Power/IT Admin User profiles afford those assigned the role with advanced security controls
Client Sharing
To protect your clients personal and financial data you have complete control over who in your company sees which clients. This could be across branches or individual users
Assumption Sets
To ensure consistency on a company level, you have the ability to set multiple cashflow assumption sets as well as having user security controls that will allow you to manage system assumptions and select who can modify them
IP Address Whitelisting
Create an IP address whitelist and lockdown the system so that access is only available via a preset list
Password Control
Set your own password protocols including password length, blacklisted passwords and expiry time
2-Step Verification
When enabled, a PIN is sent to the user via text message to their mobile device and/or via email to their email address once they have entered their password
More Information
Security FAQs User Security Profiles View Security Factsheet