Select another country/region to browse the content applicable to your location.

Your company's data is valuable

Here's how we keep it safe.

Cloud Security

Offision runs on robust, scalable cloud infrastructure, ensuring high performance, availability, and security.

Secure Development

A development workflow that embeds security at every stage to prevent vulnerabilities.

Secure Integrations

Data protection throughout every stage of integrations with third‑party services.

Security highlights

Clear controls across architecture, data protection, and operations.

Network & Architecture

Azure‑hosted, firewall‑protected, and designed for high availability.

Encryption

TLS 1.2+ in transit, encryption at rest with managed keys.

Tenant Isolation

Dedicated databases with TDE and PITR backups.

RBAC

Granular roles and permissions; least‑privilege by default.

Secure SDLC

Peer review, staged deployments, and regular vulnerability testing.

Monitoring & DR

Triple redundancy, backups, and controlled recovery procedures.

Network and app architecture

A quick overview of Offision's service architecture and controls.

  • Azure firewall protection with strictly controlled network traffic.
  • Redundant deployments across data centers for high availability.
  • Static assets are served separately; sensitive data stays within protected services.
Security architecture

Cloud Security

  • Hosted in Microsoft Azure data centers (ISO 27001, ISO 27018, SOC 1/2/3).
  • Triple redundancy across data centers to eliminate single points of failure.
  • Isolated database per tenant with TDE and PITR backups.
  • Enterprise firewall protection; strictly controlled ingress/egress.
Learn more

Data Protection

  • Encryption in transit via TLS 1.2+ with third‑party validated certificates.
  • Encryption at rest with managed keys and strict access controls.
  • Password security with one‑way hashing and salting.
  • Controlled ports: TCP 443 for web/API; TCP 587 for secure email.
  • Optional IP whitelisting for on‑prem integrations.

Multi‑Tenant Isolation

  • Dedicated database per client for complete data separation.
  • Prevents cross‑tenant access by design.
  • Independent scaling and performance tuning per tenant.

Media & System Logging

  • Uploaded media and logs stored in configurable storage backends.
  • Storage selection and retention policies follow customer installation settings.

Authentication

  • Password authentication with configurable password policies.
  • Single Sign‑On via SAML 2.0 (e.g., ADFS).
  • OpenID Connect with Microsoft 365.
  • Optional multi‑factor authentication.

Secure Development

  • Regular security releases and staged deployments across environments.
  • Peer review and rigorous quality frameworks.
  • Automated and manual vulnerability assessments.
  • Internal penetration testing by independent experts.

Role‑Based Access Control

  • Predefined roles (e.g., Administrator, Staff, User) with least‑privilege access.
  • Granular permissions to control features, modules, and data access.
  • Simplified provisioning via role assignments.

Compliance

  • ISO 27001 ISMS program with independent audits.
  • Risk‑based security management and continuous improvement.
  • ISO certification targeted by December 2025.

Privacy

We take the security of your private data very seriously, and treat it as a banner metric for success internally. You can find a complete outline in our privacy policy. Privacy policy.