Webhuk features an intuitive administrative back-end that provides security controls & user management to the Administrator. Only the Administrator can create accounts, and modify User Access permissions to prevent any chances of unauthorized access or abuse.
Custom Roles can be defined on the fly and Users can be associated with specific business Roles. Webhuk comes predefined with seven different Roles that should suffice most businesses.
We take data security & privacy very seriously. We offer security on multiple levels including the physical, software and people/process levels:
Physical: Webhuk servers and infrastructure are located in the most secure types of data centers run by Amazon Web Services LLC in North Virginia, USA that have multiple levels of restrictions for access including: on-premise security guards, security cameras, biometric limited access systems, and no signage to indicate where the buildings are, bullet proof glass, earthquake ratings, etc.
Hardware: Webhuk employs state of the art firewall protection eliminating the possibility of intrusion from outside attacks.
Logical/software protection: Webhuk scans all access 24x7 for suspicious traffic and viruses or even inside attacks; All of this is managed and logged for auditing purposes.
Process: Very few Webhuk staff have access to either the physical or logical levels of our infrastructure. Your data is therefore secure from inside access; Webhuk performs regular vulnerability testing and is constantly enhancing its security at all levels. All data is backed up on multiple servers in multiple locations on a daily basis.
Data Ownership & Security Note: All the business data generated and stored in the Webhuk application is owned and controlled by you. At no point will anyone from Webhuk gain access to your data, unless we receive prior written permission from you or the concerned authority.
Webhuk allows you to block or allow only those Users from specific Countries, Email Domains or by Username. This essentially allows the Administrator or Management to lock out unwanted Users and prevent unauthorized access to your business data!
This level of fine-grained access can prevent access to Webhuk from unauthorized networks and domains. Rules can quickly be enabled or disabled depending on the perceived security threat, or to lock out ex-employees from access to private business data.