Security

Drive Data Security through Our Industry-Recognized Rules-Based Model

Based on visibility rules, our dynamic, flexible, and centralized security model will allow you to share information without worry. Our security model allows information to be shared across your organization according to flexible visibility rules. These rules, which comply with industry regulations, provide integration to existing entitlement systems that capture customer preferences. In addition, our security model will provide you with the flexibility to meet any security requirement throughout your organization.

These security features will allow you to customize data permissions through rules – these can be based on user roles, user attributes, data attribution, legal entities, geographical location or external sources. While each component can have unique security rules, we can meet your exact requirements.

Key components of our security model are:

  1. Integrated User Authentication: This identifies and validates which users have been granted access to the platform. Our software authenticates against a user registry that has been established – either done internally or via an external enterprise user registry.
  2. Data Visibility: This is essentially the user permissions and the rules around which data they can view. Our robust data security capabilities are dynamic and rules-based.
  3. Functional Entitlements: These determine what a user can do in the system. Functional entitlements include security settings such as user roles, groups, and privileges. Users are granted privileges that allow or deny access to functionality, broad data actions, or specific attributes, screens, tabs, controls, or fields.
  4. Encryption: Is the act of securing data both at rest, and in transit. By using industry-standard JDBC libraries to connect to database servers, we can leverage information security processes provided by these assets to comply with FISMA and other standards.

Explore our CRM product further.

If you’re interested in learning more:

  • Click here to book a demo
  • Call us at +1.416.227.3717

Email us at info@nexj.com

Get started today and let us help you attain success.

Book a demo today to learn why leading financial services organizations choose our Intelligent Customer Management Solution to increase assets under management and share of wallet.

Book a Demo keyboard_arrow_right

Have a question? Get in touch with us today.

Contact our team today and we will be happy to answer any questions or concerns you may have. If you already use NexJ, you can head over to the NexJ developer community for more technical support.

Contact Us keyboard_arrow_right Developer Community keyboard_arrow_right