We work with Transparity to manage our hosting infrastructure and deliver a Security Operations Centre (SOC) on Microsoft Azure’s cloud. Transparity is an ISO27001 & ISO9001 Certified, Microsoft Azure Certified Expert Partner. The Security Operations Centre Service delivers best practices and experience-based security posture hardening, monitoring and management. It performs systematic monitoring and management of all of our platform’s security and defends against known and emerging cyber security threats on a 24/7 basis.
We understand that security is of paramount concern for any business, and we take our clients’ data security extremely seriously. That is why AccountsIQ security is based on a sophisticated, multi-layered security model and a set of important safeguards, to protect your data online. Our architecture’s security model is externally validated by independent security experts.
Our cloud accounting security is far more robust than most systems running on internal company servers because it has:
External client company users log on directly to our application servers. These are protected by firewalls to protect against unwanted access. All data transmitted to/from the hosting site is encrypted, including any documents attached to accounts or transactions.
The data relating to your company is stored in secure Azure storage controlled by separate dedicated Database Servers running Microsoft SQL Server 2019. Each client company has a unique database. That means your records are held in a separate unique database and not co-mingled with records from other companies in one large database.
All AccountsIQ client data is hosted in Microsoft’s high-security data storage facilities across Europe, the UK & US (depending on your data residency needs).
The facility’s security features include:
AccountsIQ’s cloud accounting security system allows administrators to control which functions each user within a client company can access and view based on their role.
This allows for a clear and secure delegation of tasks, and system access according to job requirements. You have total control over who accesses data, and what they can see and do, through predefined user profiles.
For example, you can set up: