Kilmist’s comprehensive application security incorporates user authentication with enterprise-grade password policies, role-based authorization with field-level security, strong 2048-bit encryption, IP address restrictions and detailed auditing for all user actions in the application.
You can focus on your core business with complete confidence and peace of mind that your application and data are fully secured. By complying with PCI DSS requirements, we fully secure your data while eliminating the cost of compliance from your budget.
Tightly control access to your billing data and processes by authenticating all users with a username and password. System security is only as strong as password security and these are some of the ways we secure your password:
Configure roles in the system to closely mimic the roles your employees play in your organization. Authorize access to every module/screen, data element and functionality in the system by specifying detailed access rights for each role. You also have the ability to assign multiple roles to each user account and exercise granular control over:
Go beyond setting access rules and monitor how the access rights are exercised by the users. Receive automatic notifications when users login or logout of the system. Obtain a quick report of all users that are online at any given point of time. This real-time notification of user’s application access across the enterprise enhances transparency and collaboration.
Track every user session crumb trail of:
Powerful search and report capabilities to determine who performed changes to specific data element within a given period of time.
Leverage auditing to improve business operations, ensure system accountability and safeguard data integrity. Detect and analyze breaches in user behavior, intentional or accidental, and swiftly respond to violations. Verify activities of strategic partners and comply with governmental regulations regarding the security and privacy of data.
Impose restrictions on the IPs from which users can connect to the application. Specify a list of IPs (IP Blacklist) from which you can prevent users from connecting to the applications. Protect the application when malicious attempts are made to hack into the application.
Restrict access to the application for certain users only from your office premises while allowing a select group of users to access the application from anywhere using IP Whitelist.
Security is not limited to user access. With data being transmitted between client and server with every transaction, data transfer security is very important. Every byte of data transmitted is encrypted using 2048-bit based encryption algorithms. We do not depend on the transport layer (like HTTPS) for encryption; instead employ message encryption where every message is fully encrypted by the client and server to be decrypted on the other end. It provides end-to-end security independent of transport and presence of intermediaries.