Bedrock Acquires Procoto to Revolutionize Procurement Processes and Enhance Enterprise Supplier Management Capabilities.
256-Bit Data Encryption
When you access your accounts and perform transactions on Bedrock Systems, your information is protected by bank-grade 256-bit encryption using the latest TLS 1.3 protocol.
Secure Firewalls
The computer systems that run Bedrock systems are protected by numerous network and application firewalls to help prevent unauthorized access to our network, and Bedrock monitors these firewalls to prevent security breaches.
Site Security
Our sites use Secure Socket Layer (SSL) and Transport Layer Security (TLS 1.3) to offer 2048-bit secure links between your browser and Bedrock.
Transactional Security
Not only is all communication between you and Bedrock encrypted, but it’s also encrypted between Bedrock and our business partners. This is one more way we’re doing everything we can to protect your information.
3rd Party Audits
Bedrock completes 3rd party independent audits each year to ensure our network, systems, data, and business processes are secure. In addition, Bedrock conducts constant external vulnerability testing and annual penetration testing. Together these audits and business processes provide our customers and partners with the most secure environment possible.
Yes, you can restrict access to a specific computer with an IP address. IP address ranges can also be employed to limit access to a group of computers.
Setting up multiple users is not only supported but also encouraged. With multiple users, access can be tracked and audited.
Yes, with access codes, reports can be blocked or granted for users or groups.
Yes, flagging permissions in setup can prevent or allow desired actions.
Passwords do expire. The default setting is every 90 days. This feature is mandatory.
Yes, within Administrator options you can specify users to be locked out after a certain number of failed attempts. Users will become disabled until the administrator or supervisor re-enables the user.
All unsuccessful login attempts are logged and monitored.