Your Information, Our Priority

Where data security meets peace of mind

Free Demo
Your Information, Our Priority

Data Security

When registering with Qkrbiz, you can be assured of the implementation of all industry standard security practices. We take your online security concerns seriously and continuously strive to provide an improved customer experience. Qkrbiz ensures the security of the product and your information, at all times, with the Trustworthy Computing approach. Under the Trustworthy Computing approach, multi-level security is maintained, such as the Physical Layers and Logical Layers. All in all, protection is given over physical controls, access control and video surveillance. Data isolation, hosted application security, single sign on, identity and access management is also taken care of.

Data Privacy and Data Access

Data Privacy and Data Access

In case our customer support personnel need to access your portal to provide support, it will be done using a one-time random token so that you don’t have to share your login credentials. Our support persons will get access when you share the token number generated by you, they will troubleshoot or provide help as needed. Token will expire after a specified time or on log out. Never share your password with the Qkrbiz support team or anyone else.

Restricted Access to Databases and Data Storages

Restricted Access to Databases and Data Storages

Access to Databases and data storages is restricted to limited seniormost executives in the organization. Developers do not have direct data access.

Data Segregation/Isolation

Data Segregation/Isolation

It is ensured at all times that the multiple customer data is segregated and access is allowed to the respective customer only. Data isolation and various logically induced security boundaries, also help Qkrbiz in maintaining a separate database for each customer without giving access to or being compromised by any other user.

No Local Storage of your Data

No Local Storage of your Data

We do not use any other local or on-premise infrastructure to store any customer information on our development or test environments. Qkrbiz is hosted on Tier-4 cloud infrastructure which has 99.999% uptime. However we provide you an option to download and keep a copy of your data, as an additional backup for your peace of mind.

Secure Token Based Support

Secure Token Based Support

In case our customer support personnel need to access your portal to provide support, it will be done using a one-time random token so that you don’t have to share your login credentials. Our support persons will get access when you share the token number generated by you, they will troubleshoot or provide help as needed. Token will expire after a specified time or on log out. Never share your password with the Qkrbiz support team or anyone else.

Physical Security

To maintain the security of information and data stored by customers online, data center ensures and maintains several security checks in the physical domain of the stored data. Following are a few practices that help ensure all round security for its users:

Physical Monitoring

Physical Monitoring

Over the limitation of physical access, the data center is further secured with motion sensors, 100 percent- secured access protected with security alarms and video surveillance.

Climate Control and Measurement

Climate Control and Measurement

Constant and continuous measurement of humidity, temperature is carried out to ensure smooth running of the equipment.

Secure Network Design

Secure Network Design

The Qkrbiz network is designed in a way which ensures necessary segmentation of critical servers and public facing interfaces.

Authorized Personnel Access

Authorized Personnel Access

Physical access to the data environment is limited to authorized personnel only. This access is given to an individual only after verifying the need and eligible requirement, such as to manage customers’ applications and services. Further, a few more security processes such as double authentication for physical access, round the clock video surveillance and on premise security officers secures the data center environment.

Enhanced Hardware

Enhanced Hardware

The hardware that is used at data centre work in the most efficient and secure manner, keeping in mind the security practices followed by Qkrbiz. These equipment’s efficiency helps the company save power and costs, the benefits of which are then extended to our esteemed customers.

Disaster Risk Management

Disaster Risk Management

Provision to sustain through seismic disasters and also well equipped for prevention of fire break outs.