Storing master data must be done safely. Beeyond stores data in the cloud. Although the door cannot be physically locked, Beeyond makes sure the data are safe.

Safe data in the cloud


Safe data in the cloud

In the old days, alle important documents used to be stored in the archive; a large space within the building of your organization with a firm lock on the door. Later, this room was replaced by a smaller one where servers were placed. The server room was provided with air conditioning and fire detectors and the room was protected by a well-locked door. Nowadays data are to an increasing extent stored in the cloud. Data can be retrieved online by logging in with a password.

That storing data in the cloud is becoming more and more popular is mainly thanks to the accessibility of the data. All over the world data are accesssible, providing one has the right login details. Furthermore, saving data in the cloud saves huge costs involved in the purchase and management of servers and accompanying facilities such as air conditioners and fire detectors.


How safe is Beeyond?

As a cloud-based system Beeyond is the replacement of part of your servers. It works through a login code and your data are available anywhere, anytime. But Beeyond does more to protect your data, as we realize that we are often dealing with sensitive information. It concerns your master data, data that are of great importance to your organization.

How we dealt with that is extensively described in the article ‘Is my data safe in the cloud?‘.

For instance, we have chosen for hosting of the data with a provider who is known as the safest in the world. The entire technical environment is protected with several login codes and access is provided through a very well-protected https connection and an offline backup is always available.


Rights for users

An important aspect of safety is the extent to which users have access to data. Certain information must be visible to everyone, but other data should stay hidden. In Beeyond the administrator can assign rights to users. This way, the extent of visibility and processability of data can be limited.

overview rights and roles



Read also about the structure of the system