Re-Leased

Security lock icon

Security

Find out how we make our platform secure and reliable.

Server backups

Re-Leased Property Management Software leverages the Microsoft Azure cloud platform. Our servers are hosted in global Azure Data Centers and geo-replicated to multiple international locations at any given time to maintain Fault-Tolerance & Redundancy. The Azure service replicates multiple redundant copies of our data to multiple physical servers in real time to maintain data availability and business continuity. In the case of a hardware failure, Windows Azure provides automatic failover to optimise availability.

Restore

There is no need to restore from a previous backup in our system. Correcting an error by removing or amending the record can be against compliance regulations. Instead Re-Leased provides easy ways to reverse errors leaving a clear audit record of what was transacted and what was done to correct the transaction error.

Security

Microsoft Azure security iconMalicious or accidental removal of data is mitigated by the fact that the software and data are not stored on any local hardware or exposed in a manner, which a client could directly access or manipulate them.

From a security perspective. The Azure platform is designed to provide “Defence in Depth,” reducing the risk that failure of any one security mechanism will compromise the security of the entire environment. The Defence in Depth layers include: Filtering Routers, Firewalls, Cryptographic Protection of Messages, Software Security Patch Management, Monitoring, and Network Segmentation.

A full technical overview of the Azure hosting platform security features can be found at 'Microsoft Azure security overview'

User-stored backups

While Re-Leased fully secures and backups the system on several global servers, the user can also download and locally store all compliance reports in PDF format as part of our Close of Period process. Alternatively all reports can be downloaded in a CSV format and stored as data files. The information in these reports provide sufficient details to transfer all balances to another system. The reports also provide sufficient information for detailed audit requirements.

Hardware failure

As a cloud based system there is no hardware for the user to maintain.

Theft of hardware

Most effects of theft of any client hardware are mitigated by the fact that the software and data are not stored on any local hardware. In cases where a thief might attempt to access a client’s online data via their stolen hardware, Re-Leased has a number of security measures and policies in place to mitigate that risk such as two-factor authentication.