We take the security of your sign and it’s message seriously. Our software is built from the ground-up with a security posture in mind. Below is a high-level overview of some of these benefits within SignCommand.
Sign and Software Communication
All communication between the sign and the SignCommand servers, as well as between the web browser and the servers, is performed over port 443 (HTTPS). When you see the lock icon in your web browser, this means that all data is encrypted and cannot be read even if it is captured by a third-party. In addition, signs on the SignCommand network do not require access to an organization’s internal network or direct communication with the machine accessing the client application. You may choose to isolate the sign from the rest of the network, or use another method of communication to the internet entirely. Learn more at Technical Specifications.
Individual User Accounts
Each user for your organization is supplied with their own account credentials. This allows granular control over who has access to the organization’s account without the need to share passwords. An unlimited number of users can be created, and two roles are provided (standard user and organizational administrator) for different levels of permissions.
Every user in your account may optionally enable two-factor authentication to add an extra layer of protection to their account. As with a banking website, logging into the application then requires a secret code that is sent to your mobile device. This means that even if someone were to learn your username and password, they would still be unable to log into your account and you would be notified of the attempted access. Learn more at Two-Factor Authentication and Sign Software.
Amazon Web Services
AWS utilizes an end-to-end approach to secure and harden their infrastructure, including physical, operational, and software measures. Built from the same infrastructure that powers Amazon.com, thousands of companies and millions of users rely on AWS to serve their mission-critical applications and data every day. We leverage these tools against digital attacks and hacking attempts. Learn more at Why We Use Amazon Web Services.