Policy last updated on June 13 2021 10:21:44.
Workberri provides Software as a Service(SaaS) and On-Premise software products to millions of users worldwide to solve their business problems. Security is a key component in our offerings, and is reflected in our people, process, and products. This page covers topics like data security, operational security, and physical security to explain how we offer security to our customers.
Workberri uses Amazon Web Services to host your data in US (Virginia) or European Union (Frankfurt, Germany). You can purchase on premise editions of Workberri to host it in your country or on your server. AWS also maintains the following certifications: HIPAA, GDPR, ISO 27001, SOC 1/2/3, Directive 95/46/EC and PCI DSS Level 1.
Two Step Authorization
The Workberri OTP and Google Authenticator apps provide one-time password codes for two-step authorization in Workberri and other Workberri products. Even if your password is stolen, your account will not be accessible to a would-be hacker.
Your Data is Safe
Even in cafes, airports and other places with public WiFi connections, passwords to Workberri cannot be stolen. Users can confidently open Workberri in public places through WiFi or mobile network connections. Workberri is accessed exclusively through an SSL connection, from intital authorization to the downloading and uploading of company data.
Workberri has over 10 years of experience in providing the highest level of security for web projects. Workberri benefits from all of this experience and technology, including Workberri' own proactive Web Application Firewall, which categorically blocks the vast majority of attacks on web applications.
Workberri offices are secured via keycard access and video monitoring system. Access to Workberri servers is permitted to a small number of Workberri employees, requires OTP and is limited by IP address. Workberri maintains own cyber security department and uses external security consultants.
99.9% Server Uptime
Workberri uses two independent data centers and redundant clustering technology to make sure the service is maximally available.