Security
Frequently Asked Questions
Does Phoenix provide Multi Factor Authentication?
Yes, the SaaS administrator (the user who bought the subscription) can force the Two Factor Authentication (2FA) for every user. If the administrator does not force the 2FA, it’s an option to activate in the user account. Note: this feature requires to install the mobile application Google Authenticator (available on Android and iOS)
Where is Phoenix’s data stored?
Our servers, securely hosted in Switzerland, are operated with utmost emphasis on security. The server owners vigilantly safeguard against worst-case scenarios and have meticulously engineered the infrastructure to manage critical risks. This includes compartmentalized spaces, automatic threat detection systems, and robust redundancy backups, ensuring resilience and continuous protection.
Is the information encrypted?
Indeed, all information and attachments undergo encryption when stored on our servers (data at rest). Furthermore, data in transit is securely encrypted as it moves across networks. This dual-layer encryption guarantees that the data remains confidential, preventing unauthorized access and ensuring it cannot be intercepted or read by unauthorized parties.
Does Phoenix provide Multi Factor Authentication?
Yes, the SaaS administrator (the user who bought the subscription) can force the Two Factor Authentication (2FA) for every user. If the administrator does not force the 2FA, it’s an option to activate in the user account. Note: this feature requires to install the mobile application Google Authenticator (available on Android and iOS)
Where is Phoenix’s data stored?
Our servers, securely hosted in Switzerland, are operated with utmost emphasis on security. The server owners vigilantly safeguard against worst-case scenarios and have meticulously engineered the infrastructure to manage critical risks. This includes compartmentalized spaces, automatic threat detection systems, and robust redundancy backups, ensuring resilience and continuous protection.
Is the information encrypted?
Indeed, all information and attachments undergo encryption when stored on our servers (data at rest). Furthermore, data in transit is securely encrypted as it moves across networks. This dual-layer encryption guarantees that the data remains confidential, preventing unauthorized access and ensuring it cannot be intercepted or read by unauthorized parties.