Shield Platform Encryption gives your data a whole new layer of security while preserving critical platform functionality.
Astario provides two options for limiting access based on the user's network location. Trusted and Restricted IP.
As an Astario admin, you can enhance the security by requiring a second level of authentication for every user login.
Astario supports two options to implement single sign-on—federated authentication using Security Assertion Markup Language (SAML) or delegated authentication.
CAPTCHA Security for Data Exports
On request, Astario can require users to pass a simple text-entry user verification test to export data from Astario.
Access to Data
Astario provides a flexible, layered data sharing design that allows you to expose different data sets to different sets of users.
It enables you to encrypt sensitive data at rest, and not just when transmitted over a network, so your organisation can confidently comply with privacy policies, regulatory requirements, and contractual obligations for handling private data.
Track login and field history, monitor setup changes, and take actions based on events. System Administrators can monitor all login attempts for Astario and the login history page will display the most recent login attempts.
Use permission sets and profiles can be used to specify the data type and specific fields users can access. Further, Astario comes with organization-wide sharing settings, user roles, sharing rules to specify the individual records that users can view and edit.
Authentication means preventing unauthorised access to your organisation or its data by making sure each logged in user is who they say they are.