Invested in your protection

If you speak Geek and want to know all the specs and various acronyms, proceed below (or pass the information on to your IT person).

check list icon

Secure data storage and backups

check list icon

PCI-compliant payment processing

check list icon

TLS encryption

check list icon

Firewall protection

check list icon

Frequent monitoring

check list icon

Internal controls

check list icon

Privacy safeguards

line

Data storage

Data storage icon
Storage and certifications

Your data is protected with AES 256 encryption and stored using Amazon Web Services (AWS), based in the U.S. Certifications for AWS data centers include SOC2, PCI-DSS Level 1, and ISO 27001. For more detailed information on security controls and certifications, see the AWS Cloud Security page.

Automatic backups

All of your data is automatically backed up using Amazon Relational Database Service (Amazon RDS) so you don't have to worry about losing any of the information you enter in the software.

Disaster recovery protocols

We have a system in place for customer data recovery. Your data is backed up and archived nightly at a secondary secured location so it can be recovered if a disaster occurs.

Data security

Data security icon
Secure payment processing

Aplos is fully PCI compliant, and equips you to securely collect donations and other payments using our payment partners, which are fully PCI compliant, use data encryption, and monitor for fraud.

TLS encryption

All network traffic at Aplos is encrypted via 256-bit Transport Layer Security (TLS). Your requests to our load balancers, the traffic between the load balancers and our servers, and the traffic between our servers are all protected via high-grade security certificates. All transaction services with TLS use HTTPS.

Multi-level firewall protection

Each firewall system level includes protection and safeguards to keep your information private and secure.

Frequent monitoring

We frequently monitor the software for stability and security, and we perform monthly OWASP/SANS Security Scans.

Internal controls

Internal controls
Access controls

All users have unique email logins. A user may securely log in with their Google account or with a strong unique password. Passwords have a minimum character requirement, and they must include a combination of uppercase and lowercase letters, numbers, and symbols. Users will also automatically be logged out of the software after a period of inactivity.

Monitor users with activity logs

You are able to know exactly what users are doing in the software by monitoring a detailed activity log that can't be edited.

Role permissions

We offer role-based permissions so you can control who can access different reports or areas of the software. Administrators can adjust permissions as well as add or remove users anytime.

Lock down information

You can reduce the risk of financial reporting fraud by locking down transactions after bank reconciliations or closing periods so those transactions can no longer be changed.

Privacy

Privacy
Privacy policy

Aplos understands how important it is for your organization's data to be private, so we are committed to keeping it secure. Our staff is trained and required to safeguard all data with established policies and procedures. We will not, under any circumstances, sell your personal information or entered data. For questions on our privacy practices, view our Privacy Policy.

Privacy shield

We participate in the E.U.-U.S. Privacy Shield Frameworks and comply with the Privacy Shield Principles. Go to privacyshield.gov to learn more.

Award-winning customer service

personpersonpersonpersonperson
We are here to equip you with the powerful, effective system you need to help you feel confident you are doing it right. Our experts provide:
check list icon

Setup assistance, training resources, and help with data migration

check list icon

Free, ongoing software support

check list icon

Award-winning Aplos Academy and support center for tutorials