Product

Acumatica Multi-level Security

Protect Your Business with Unmatched Security: Safeguards your data from system access to data entry, transmission, and storage.
  • Public or private hosting options
  • Role based access to screens, fields, inquiries, and reports
  • Data input and accessibility valid only through Acumatica business logic
  • Complete audit history for logins, logouts, screens accessed, emails sent, and more
  • Web Application security solution continuously monitors and protects against malicious attacks
  • Single-Sign-On (SSO) and Multi-Factor Authentication (MFA) user account protection
  • Advanced Encryption Standard (AES) and TLS 1.2 encryption algorithms for data transmission

Ensuring data safety and best practices every day

Acumatica prioritizes robust security protocols to safeguard your data. With advanced encryption, regular security audits, and multi-layered defenses, Acumatica ensures that your information remains protected against threats.
[Ransomware] spread throughout all three counties; all the computers and servers except for one Active Directory server, one file server and our backup...It was a nightmare of a time for the whole agency. We were down for two weeks without Internet...There was absolutely no affect at all on Acumatica; it was just a matter of not having the Internet so [anyone needing it] just worked from home.”
Tammy Raub
Tammy Raub, CFO
Mozaic

Acumatica Security Highlights

User Login Accounts

Authorize user access via a unique login name.

Cyber Security

Ensure consistent security and identity experiences to minimize friction for developers and business initiatives and reduce organizational risk from cyberattacks by implementing end-to-end identity management, data protection, strong authentication, trust validation, cloud security, compliance, two-way data monitoring, and data encryption.

GDPR Compliant

Comply with the European Union’s General Data Protection Regulation by tracking a user’s consent to store and process private information and hide or completely erase it if consent expires.

Single Sign On (SSO)

Technologies supported include Active Directory (AD), Microsoft Active Directory Federal Services (AD FS), Microsoft Entra ID (formerly Microsoft Azure Active Directory), and providers that support Open ID Connect (such as Google, OneLogin, Okta).

User account types

Assign user accounts to UI, API, or Unrestricted types. UI accounts access the system via the application user interface login screen, API accounts via web services, and Unrestricted accounts via the UI, web services APIs, or OAuth 2.0

User Access Rights

Assign access rights to specific application areas, including forms, containers of form elements, and form elements. Configure user access rights through roles, user logins, or application screens.

Two-Factor Authentication

Configure two-factor authentication (2FA) to permit system access only after a user provides additional evidence of authentication through email or sms or enable 2FA push notifications with the Acumatica Mobile App.

Security Preferences

Define security settings for your organization, such as system passwords and lockout policies for unsuccessful login attempts, encryption certificates, and audit settings.

Password Policies

Establish password policies for your user community including employees, customers and APIs, including specifying time intervals that require users to change their password, minimum password length and complexity, password validation mask, and a message for incorrect password entered.

IP Filters

Limit logins by listing the range of IP addresses that are granted access to the system. Login access is denied for IP addresses outside the range specified for the user account.

Device and location tracking

Gain visibility into mobile devices used to sign into Acumatica. Mobile devices that access the system are automatically registered with the user’s login account.

VPN (external network protection)

Protect PC and mobile device data when in a public IP location, such as a coffee shop, airport, etc.

HTTPS (data in transit protection)

Secure data in transit with either an Acumatica or Customer provided TLS certificate.

Timeout Settings

Specify the time interval of user inactivity before requiring re-sign-in, as set in the web config file. Default: 1 hour, Minimum: 15 minutes, Maximum: 8 hours.

Audit Preferences

Define the number of months to retain the audit history of user operations.

Linked Entity

Link user login accounts to employees or exiting contact accounts in the system.

Business platform features and applications

Set a rock-solid foundation for success with a future-proof cloud platform.

From our customers:

Smartnumbers- Success Story of Acumatica Cloud ERP
Smartnumbers works with some really high profile and sensitive organizations. Being a TelCo carrier in the UK, we are obliged to look after our data really carefully, so security is really important to us. In our prior system it took a lot of time and effort to ensure we were securing all our systems and infrastructure. Acumatica has taken a lot of that burden off our hands. They’ve got great security policies and with the data residing on AWS, we know that it's really well looked after.”
Chris Drake
Chris Drake, Chief Operating Officer
Smartnumbers
Incubeta - Success Story of Acumatica Cloud ERP
Since our implementation of Acumatica, we have acquired two businesses. We brought them on very quickly into our accounting structure, allowing us to visualize reporting, which was a massive benefit for us.”
Sean Reuben
Sean Reuben, Group Chief Financial Officer
Incubeta

Awards, recognition, and reviews

Acumatica is recognized as one of the best ERP software products on the market by leading industry organizations, publications, and our customers.

See what’s possible with a future-proof cloud ERP system that puts security and its customers first.

Schedule a demo