Leverage the Power of SaaS
Keep Content and Assets Safe & Secure
In addition to the tight controls we put on our multiple Tier III and Tier IV SSAE16-audited data center locations, we provide a wide range of network, security and data protection controls. The CrownPeak platform supports a comprehensive series of configurable data and functional access controls. The entire security infrastructure is regularly tested and validated by industry-leading third party vulnerability and penetration assessment specialists.
Data Security
Using inheritance-based access control lists (ACLs), administrators can define access rules for all the content managed by CrownPeak. Data is encrypted in transit throughout the CrownPeak Platform; encryption for data at rest is also available. All storage is wiped to US DoD 5220.22-M or NIST 800-88 standards both before it is provisioned for use by the CrownPeak Platform and after it is released.
Functional Security
Group-based ACLs are defined to partition and regulate the functions any given group can perform. Users must have access to both the asset and the particular function they wish to carry out before they can perform any action on any asset.
Workflow Security
Group-based ACLs are defined to partition and regulate the functions any given group can perform. Users must have access to both the asset and the particular function they wish to carry out before they can perform any action on any asset.
You can configure as many workflow and approval streams as necessary to support the governance rules of your company. Every asset within the CrownPeak platform repository is subject to one of the defined workflows, which further restricts when, how and by whom it may be manipulated.
CrownPeak has achieved Safe Harbor for the EU data privacy standard.