Protecting your data is core to our business.
Our world-class cloud infrastructure helps us deliver a secure and reliable service you can depend on. Reach out, schedule a demo, and learn more today!
Security awareness is part of our culture. We select trustworthy people for our team and then continually train them and reinforce their responsibility for protecting our customer’s data.
Ceterus verifies each individual’s education and previous employment before they join our staff. Reference checks and criminal, credit, immigration, and security checks are part of the hiring and onboarding process.
The Ceterus Edge service includes a security model that logically separates each customer’s data from another. While store-level data access is controlled by a small number of administrative users who are carefully vetted before they are granted administrative access.
Our service has been designed and implemented to run on the Google Cloud Platform. Google has a rigorous program for independent verification of security, privacy and compliance controls, and we directly benefit from these protections.
User credentials to external providers (including banks, QBO, Point-of-sales, etc.) are stored in a secure database using high levels of encryption.
At Ceterus, we maintain and regularly review an audit trail of all system access points and monitor all usage–verifying that our systems and networks have not been compromised.
Our world-class cloud infrastructure helps us deliver a secure and reliable service you can depend on. Reach out, schedule a demo, and learn more today!