Security

Claritas Security.

Your application security and data privacy is our utmost priority.

We take customer confidentiality seriously. Claritas™ CRM is built on enterprise-grade security infrastructure with multiple layers of protection — from physical data centre security to application-level encryption and audit trails.

Physical Data Centre

Claritas operates within Microsoft Global Foundation Services data centres with geographic distribution across North America, Europe, and Asia. These world-class facilities include redundancy for power, hardware failure prevention, physical intrusion defence, and network outage mitigation. The same infrastructure hosts Microsoft Online Services like Office 365.

Confidentiality

Protection mechanisms include identity and access management, multi-tenant data isolation (both physical and logical), and encryption of sensitive fields using industry-standard algorithms. SSL/secure HTTP with private key management is available. Network packet filtering minimises spoofing and denial-of-service attacks. Fixed IP address access restrictions are configurable per customer.

Integrity & Compliance

Claritas sits on top of the Microsoft Azure cloud stack, maintaining ISO 27001 certification and Safe Harbor Framework compliance. Geographic data storage location options are offered. Access controls, encryption, availability measures, and privacy protections prevent unauthorised modifications and access to your data.

Availability

The cloud infrastructure provides robust availability based on extensive redundancy achieved with virtualisation technology. Virtual disaster recovery with hot-failover capability leverages geographically distributed infrastructure. Automatic health monitoring and failover occur transparently without customer intervention during maintenance — ensuring 99.9% uptime SLA.

Accountability & Audit Trails

Claritas demonstrates safe operation accountability and traceability through multiple levels of monitoring, logging, and reporting. The audit trail captures all module activities in database logs, providing full visibility into intentional or unintentional data modifications. Every action is traceable to a specific user and timestamp.

Data Backup & Retention

Data replicates across three separate nodes within the cloud for real-time high-availability. Automatic periodic archival and backup optimise system performance. Optional personalised backup extracts data to offsite private storage for an additional layer of protection.

Data Deletion

Upon subscription termination, rigorous procedures ensure complete data removal from primary and backup sites. Successful execution of delete operations removes all references to the associated data items. Your data is never retained beyond the agreed retention period.

Internal Staff Protocols

All staff implement high levels of professionalism and integrity. Formal access request processes require client acknowledgement before accessing confidential accounts. Multi-tier security features enable independent malicious activity detection. Background checks and security training are mandatory for all personnel handling customer data.

By Private Appointment

Questions about security?

Our team is happy to discuss security requirements and compliance needs.

View 8 design versions →