Login

Enterprise Level Infrastructure & Security

https://cdn2.hubspot.net/hubfs/5011337/security-ok.mp4

Infrastructure & Security
included Free Feature

Microsoft Azure secure hosted infrastructure

Two Factor Authentication (2FA)
option Optional feature

Helping to address vulnerabilities of a standard password-only approach 2FA can be added in your workflow steps

Infrastructure

included Free Feature - This feature comes as standard with WeAproove+ Free Account

WeAproove is hosted on the Microsoft Azure cloud infrastructure. 

saasNinety percent of Fortune 500 companies trust their business to run on the Microsoft Cloud infrastructure. The general feedback from our customer base was a preference to use Microsoft Azure vs. Amazon Web Services, mainly due to competition concerns in the retail, healthcare, and pharmaceutical sectors.

Microsoft Azure gives a robust and scalable hosting platform with global instances to better serve our client base, no matter what location.

Global instances allow us to offer a 99.99% uptime due to our data replication and failover strategy, which is all built into our cloud infrastructure. (For our European customer's local redundant instances ensure GDPR compatibility).

Two Factor Authentication (2FA)

option Optional feature - This feature can be added to your WeAproove+ Free Account

2fa

 

Two Factor Authentication (2FA) is an extra layer of security used to make sure that people trying to access Aproove are who they say they are.

Perhaps you want to invite a "guest" user to review a proof, and the user is not registered inside WeAproove. That user could potentially forward the invite email to someone else who could then log in to the system. 

Using 2FA, the user who received the invite would receive a second email containing a code that is required to gain access. The code would only be valid for one session. 

Two Factor Authentication is an option that can be applied across any or all users when you invite them to review a proof.
This flexibility means the feature can get used where it is most appropriate to meet your security needs.