CAPTCHA Security for Data Exports
Access to Data
UK Cyber Essentials
It enables you to encrypt sensitive data at rest, and not just when transmitted over a network, so your organisation can confidently comply with privacy policies, regulatory requirements, and contractual obligations for handling private data.
Track login and field history, monitor setup changes, and take actions based on events. System Administrators can monitor all login attempts for Astario and the login history page will display the most recent login attempts.
Use permission sets and profiles can be used to specify the data type and specific fields users can access. Further, Astario comes with organization-wide sharing settings, user roles, sharing rules to specify the individual records that users can view and edit.
Authentication means preventing unauthorised access to your organisation or its data by making sure each logged in user is who they say they are.