Information security in a technological tool is vital to protecting the integrity, confidentiality, and availability of information, ensuring regulatory compliance, and preventing losses, reputational damage, and cyber-attacks. At Pirani, we have created a new "Security" section based on ISO 27001 to protect our users and their organizations and give them the necessary tools to care for themselves.
The new "Security" section is a space within the organization's administration where organizations can control and protect their information, users, access, and passwords. In addition, you will be able to monitor your organization's security level from a leading panel and view some security recommendations for sessions and users.
→ Section and features available in the Enterprise plan ⚡
In the "security information" section, you can track and monitor the security level of your users and the organization. You will find a dashboard with all the security settings and suggestions in each aspect to improve the level and take care of what matters most.
Learn more about the functionality in this tutorial.
With the "Session Management" and "Password Management" sections, you can guarantee the security of your users, information, and organization and prevent unauthorized access to sensitive systems and data. These two sections also allow you to establish standards for the creation, management, and protection of passwords and configure and determine the duration of active user sessions within the system.
Learn more about the two sections in these tutorials: Session Management and Password Management.
Find out how secure it is to manage your risks in Pirani. Try Pirani for free, and tell me in the article's comments what you think about the security section's functionalities.
With Pirani's Audit Log, you can protect the organization and perform audits on what is happening in the system. This section allows you to visualize the logs of all types of actions performed by users within the software. This will facilitate monitoring failed actions, analyzing events, and supervising actions that may affect security or operations.
Learn about the Audit Log in this tutorial.
In security, you will find the "Roles" section, where you can create different roles to organize, control, and assign specific responsibilities to the organization's users. In this section, you can enable permissions in the different management systems, cross sections, and specialized sections.
Add a layer of security to your account with multifactor authentication (MFA) and single sign-on (SSO) parameterization. These functionalities will allow your organization's users to strengthen the security of their accounts since, at each login, they will have to authenticate themselves either with a code that they will receive by text message or with SSO authentication.
Learn about the two types of authentication in these tutorials: MFA authentication and single sign-on (SSO).
→ Section and features available in the Enterprise plan ⚡