• Security

Data security is part of our DNA

Protecting customer data is at the core of our business. We are mindful that our products are utilized in every major business vertical, including those requiring elevated levels of security such as healthcare, government and finance.

  • Our solutions employ multiple layers of data encryption both at rest and in transit
  • We adhere to industry standards for securing personal data / financial transactions
  • All of Field2Base's data centers are located in the United States
  • All IT infrastructure is monitored 24X7 365 to ensure reliability and protect against emerging threats
  • Employees are subject to pre-employment criminal background checks and continued audits
  • All of our office locations are secured with  a state-of-the-art access control card systems

REQUEST SOC2 TYPE2 AUDIT REPORT

Install on any Android, iOS or Windows device.

Our secure online forms are designed to work in conjunction with common device platform security measures including:

  • Customizable Security Settings
  • Multifactor Authentication
  • Single Sign On (SSO)
  • 256 AES Encryption at Rest
  • TLS 1.2/1.3 Encryption in Transit
  • System Activity Logging / Auditing

Mobile Forms Security Architecture

Our software protects user data from the point of origination to its final destination during the following steps:

Application Access

Our application may be configured to require additional user authentication after basic device authentication has been satisfied.

Data Transport

Client data is encrypted in transit.

Local Data Storage

All client data stored in the mobile apps and in the cloud is encrypted at rest.

Remote Device Management

The Field2Base portal allows administrators to remotely customize the user's app experience.

Remote User Management

The Field2Base portal lets administrators create custom user permissions and roles.

Customer Data Separation

Every customer receives individual encryption keys, which guarantee robust data segregation and privacy.