“LeaseQuery has made lease accounting incredibly simple, allowing us to securely store and organize all of the documents and information, create detailed summaries on each property, and download comprehensive reports in minutes.”
Operations Manager, Scotland Wright
LeaseQuery servers and your data sit behind secure firewalls. This ensures that only authorized network users can access information.
LeaseQuery undergoes external penetration testing twice a year to evaluate the security of the application. This ensures that any potential security flaws are found and remedied quickly to keep your data safe from attackers.
Access to any data within LeaseQuery is restricted by a secured username and password. The Application Security Layer ensures that each client only has access to their data using a valid username and password.
Usernames and passwords are not directly stored in LeaseQuery’s databases. Instead, a Secure Hash Algorithm (SHA) is applied to them. The algorithm is a one-way conversion of the username or password to a fixed length hash-output making it practically impossible to convert the hash-output back to the original username or password.
LeaseQuery has chosen Amazon Web Services (AWS) as its hosting infrastructure provider. With a 99.95% uptime guarantee, AWS is the number one cloud-hosting provider in the industry. Your data is backed up nightly on AWS and weekly backups are stored in an offsite location, ensuring your information is safe and your records can be quickly restored.
SSL Encryption Certificate
LeaseQuery is accessible via SSL encrypted endpoints to avoid data being intercepted. The encrypted endpoints are accessible from both the internet and LeaseQuery, ensuring secure transfer. When your username, password, or lease information is entered in your browser, it cannot be compromised. The lock icon on the browser’s address bar verifies the SSL certificate is valid.
Security Shouldn’t be a Sacrifice
LeaseQuery utilizes servers located in world-class data centers, which provide the following protocols to ensure the physical security of your data:
- 24/7 physical security for constant surveillance
- Full network redundancy
- Advanced fire protection, suppression, and detection system
- Advanced integrated monitoring system which utilizes retinal and vascular scanning and redundant UPS power systems to avoid power failure and outages