Your data is your business which makes it our top priority.
At its core a Customer Relationship Management (CRM) system is designed to help build and manage your clients’ data. The information collected is key when making important business decisions, so it needs to be regularly updated, maintained, and secure. Keeping your system data accurate and up-to-date affects all business decisions and how you manage client relationships. A secure CRM to manage this data enables you to identify, map, predict, and manage relationships with your clients.
Remember the three S’s when evaluating CRM platforms to store and manage your important data.
Security
Know where your data is stored so you can be confident your business's information is secure. Far too many companies either have no formal process or sloppy data processes that lead to information being out of synch, lost, or stolen. Investing in secure data management translates directly to your bottom line.
Sharing Permissions
Providing key people on your teams custom access to valuable contact data is essential. One of the biggest security threats we see companies make is sharing login information across their entire team. Instead, opt for a CRM that allows you to customize defined access in the system for each person and keep your team accountable.
Searchability
It’s easy to invest time building out and managing your client relationships when key information and reports are right at your fingertips. A Complete CRM solution integrates all of the tools needed for sales, marketing, customer success, and operations seamlessly integrated in the same platform. Real-time reports almost generate themselves.
We know how important data integrity is to your business. Venntive is a CRM and marketing automation platform poised to meet your data integrity needs. We're committed to helping you sustain accurate, complete, and secure data. It's a key piece to your business's success. Here are the ways Venntive helps protect and respect your data:
- Proprietary Private Cloud.
Venntive is housed on a privately owned server cloud. No shared servers or web services means an exceptional level of control and security. It also means we are FINRA- and HIPAA-compliant.
- Data Center Auditing
. Our systems are hosted at three different co-location facilities with US-based company that is a leader in data center hosting and management. They are certified yearly to SOC (SAS/70) compliance, and meet or exceed the Standard Control Objectives established by the AICPA (the American Institute of Certified Public Accountants). Those criteria include capacity planning, change control, logical and physical security, and monitoring, among others.
- Physical Security
. All of the data centers have on-site security personnel at all times (24/7/365). Each entrance has a video-monitored man-trap with remote release and biometric scanners. Each door within the data center requires a digital card to access, and all floors are monitored with CCTV surveillance with a 90-day storage window.
- Network Security
. Our servers are housed at three different locations, with each cluster protected by one or more firewalls. Virtual Private Networking (VPN) is required to access any of these clusters remotely, and these VPN connections are created and customized for each individual that requires access. Only essential personnel are allowed access.
- Application Securit
y. We do not store user passwords: we instead use strong encryption to encrypt those passwords. The resulting encrypted data is hashed to produce a unique signature of that password which is the only value that is stored in our database. It is virtually impossible to decrypt the password from the stored database.
- Backups
. A full database backup is performed on a nightly basis. These backups are not only stored locally for rapid recovery when needed, but are also copied over a secure dedicated line to an off-site facility in another state (with the same security and auditing levels as described above). Application code and assets, as well as all user-uploaded media files are stored on high-availability Network-Addressable Storage systems that permit point-in-time recovery to within an hour. We also run full daily backups on all of these files and copy them to the off-site facility. Additionally, the files are synchronized hourly to a disaster recovery site.
- Monitoring
. We employ an extensive monitoring suite that notifies us with any systems-level out-of-bounds condition (including hardware failures and software issues). We also employ an application-level system that tells us if any of an extensive set of assertions within the application have failed. We have personnel available 24/7/365 to monitor and respond to any situation.
We strive to be as transparent as possible to ensure your data is secure. Don’t trust just anyone with your valuable data. Our first priority is to our customers, committed to your success. Reach out to Venntive to learn more about our security offerings and features.