Loading...
Application Security

Application Security

Kilmist’s comprehensive application security incorporates user authentication with enterprise-grade password policies, role-based authorization with field-level security, strong 2048-bit encryption, IP address restrictions and detailed auditing for all user actions in the application.

You can focus on your core business with complete confidence and peace of mind that your application and data are fully secured. By complying with PCI DSS requirements, we fully secure your data while eliminating the cost of compliance from your budget.

Strong User Authentication

Tightly control access to your billing data and processes by authenticating all users with a username and password. System security is only as strong as password security and these are some of the ways we secure your password:

  • Enforce industry standard requirements for strong passwords.
  • Assign multiple security questions to each user account to be used in “Forgotten Password” scenarios without IT intervention.
  • Protect user passwords by one-way strong encryption and never decrypting the password.
  • Passwords are never displayed in the system (even to administrators).
  • Temporary passwords are directly delivered to users via email and users are forced to set a new, strong password immediately.

Roles & Authorization

Configure roles in the system to closely mimic the roles your employees play in your organization. Authorize access to every module/screen, data element and functionality in the system by specifying detailed access rights for each role. You also have the ability to assign multiple roles to each user account and exercise granular control over:

  • Every screen in the system that the user can access ( UI).
  • Type of access provided to displayed data – Read only, Read/Write, Create New & Delete ( Record Level).
  • Access to important data fields in the records such as Tax Identification Numbers, Social Security Numbers, Credit Card numbers and Credit limits ( Field Level).
  • Tasks that can be performed such as AR Posting, Account Termination, Credit Issue and various billing processes. You can also determine the access to certain global tasks (across the application) such as exporting data and entering notes ( Task Level).
  • Every report in the system that the user can run ( Report Level).
  • Every data type that can be exported ( Data Map).

Divisions

Create divisions to accurately represent your company’s departmental hierarchy. Assign users and roles applicable to each division. Control the access rights to data owned by each division by users of its sub-divisions and other divisions in the organization.

Teams

Every organization has their employees work in teams. Create teams in the application to closely mimic your organization. Simplify multiple users’ access management by assigning roles to teams.

User Audit

Go beyond setting access rules and monitor how the access rights are exercised by the users. Receive automatic notifications when users login or logout of the system. Obtain a quick report of all users that are online at any given point of time. This real-time notification of user’s application access across the enterprise enhances transparency and collaboration.

Track every user session crumb trail of:

  • Login and logout times.
  • IP address from which the user connected to the system.
  • Application screens visited by the user.
  • Accessed records.
  • Operations performed (Create New, Edit, and Delete).

Powerful search and report capabilities to determine who performed changes to specific data element within a given period of time.

Leverage auditing to improve business operations, ensure system accountability and safeguard data integrity. Detect and analyze breaches in user behavior, intentional or accidental, and swiftly respond to violations. Verify activities of strategic partners and comply with governmental regulations regarding the security and privacy of data.

IP Security

Impose restrictions on the IPs from which users can connect to the application. Specify a list of IPs (IP Blacklist) from which you can prevent users from connecting to the applications. Protect the application when malicious attempts are made to hack into the application.

Restrict access to the application for certain users only from your office premises while allowing a select group of users to access the application from anywhere using IP Whitelist.

Data Transfer Security

Security is not limited to user access. With data being transmitted between client and server with every transaction, data transfer security is very important. Every byte of data transmitted is encrypted using 2048-bit based encryption algorithms. We do not depend on the transport layer (like HTTPS) for encryption; instead employ message encryption where every message is fully encrypted by the client and server to be decrypted on the other end. It provides end-to-end security independent of transport and presence of intermediaries.