Appointment consultation
Safety and security policy
With the development of the company, complex personnel management and user access behavior in different scenarios will bring potential threats to the network. Whether the system access behavior and employee account status can be monitored in a timely and effective manner has a great impact on company security. Moreover, security audits that fail to record login information and ignore identity management will also threaten the security of the system, and for login anomalies and Illegal authorization to access and other phenomena can not be found in a timely manner to deal with; can not grasp the process of account privileges granted, the accident can not be traced. At the same time, a manual audit is inefficient and error-prone.
Authing solution
Visual security audits
User behavior audit: records every user visit, including time, visitor, location (IP address, machine number), as well as the application logged in, whether the login was successful or not.
Administrator behavior audit: records administrator account permission assignment operations.
Application access: helps enterprises understand the real access situation of each application, help determine the value of software usage and optimize IT investment costs.
Multi-factor login
Authing smart platform will monitor users for suspicious logins or abnormal behavior and will automatically enable multi-silver authentication based on the situation, greatly improving security.
Support for customization by person/department
Password management
Authing supports the custom setting of strong password policy for successful login, etc.
Set different password policies for different people (groups)
Encrypted transmission and storage

Data storage is encrypted by AES-256 algorithm.

Data are encrypted and transmitted through SSL/TLS protocol.

2048-bit RSA key is managed by KMS management key, and the key is rotated periodically to ensure high security of one password at a time.

Multi-factor Authentication for Account Login.

Detailed Data Access and Operation Log Audit.

Client Data Security Policy Management.

Data High Availability, Multiple Copy Redundancy Storage and full backup on a regular basis.

To ensure data availability, integrity and data security

In all aspects, security defenses.

Full life-cycle security protection
7x24-hour security emergency response | Two locations and three backup centers to ensure quick recovery in case of disaster | All-round guarantee to provide continuous and stable service.
Compliance
As an enterprise-level SaaS service and identity service provider that concerns the core secrets of enterprises, Authing always puts security in the first place. Authing has international authoritative security certification and mature information security management system to secure the whole life cycle of software, with reliable data security protection and round-the-clock security emergency response measures.
ISO Quality System Certification
The certification is a recognition of Authing long-standing work in building privacy compliance systems. The Authing security team is committed to protecting the privacy of our users data and providing them with transparent, efficient, secure and Reliable service.
ISO Quality System Certification
ISO/IEC 27001:2013 Information Security Management Systems ISO 27001 is a set of standards for information security management systems that have been awarded by the industry. widely recognized security management system standard, which has always been regarded as the international authoritative and strict information security system certification standard, and has been recognized by the global community as the standard of the security management system. Authing data center, management systems, research and development, and functional departments have received this certification, which means that we have a wide range of products that can be used in a variety of applications. In the field of information security management, the company has been aligned with international standards and has sufficient information security risk identification and control capabilities, which can provide the global information security management system with a full range of services. Customers provide safe and reliable service.
Authing was included in White Paper on China Cyber Security Industry (2018).
When Authing was first launched, it was selected as an "Innovative Enterprise in Domestic Identity Management and Access Control" by the China Institute of Information and Communications Technology (CIIT) and was included in White Paper on China Cyber Security Industry (2019).
Three levels of protection
Ministry of Public Security Information Security Level 3 Certification GB/T 22239-2008 Information Security Technology Information System The Basic Requirements for Security Level Protection, referred to as Security Level Protection, is an information security standard issued by the Standardization Administration of China. It is a basic system of information security in China. The level is divided into 1 to 5 levels according to the importance of the information system from low to high, and different security levels implement different protection strategies and requirements. the Authing uses a Level 3 information system protection strategy that has been successfully evaluated by a professional evaluation organization. signifies that we have security protection capabilities recognized by the authority in terms of physical, network, host, application and data. And it reached a high level in the industry.
Connecting people and applications around the world