Skip to main content
Inventory Planner public security statement
M
Written by Marije
Updated yesterday

Security

Inventory Planner is built upon the Linode Cloud Computing platform, leveraging the elastic scalability and economic benefits of cloud computing. We make use of a number of Linode products:

  • Dedicated Compute – we use the platform to host our web servers and databases on powerful machines that we scale horizontally when required.

  • High Availability Block Storage – we use Linode's scalable, fault-tolerant storage solution, allowing us to benefit from their dedicated, secure and highly available systems.

  • Cloud Firewall Protection - this protects our network from malicious attacks through rules to only allow traffic from trusted sources. We filter traffic at the network layer using fine-grained control over who can access our systems.

Software security

Accessing your Inventory Planner system requires a username and password. Access to the administration area is over a TLS encrypted connection. All clients have their own, dedicated database. Read more about Linode security here.

Information and user security

You can configure your account so that each user has restricted access to the areas that they need to work in – for example, buying staff can be set up to only use the purchase order sections, whilst you and your leadership have full access to the system.

Backup

We understand that the data you enter into Inventory Planner is vital to the operation of your business, so our technology is designed to keep your data safe. Your data is backed up every 24 hours and those complete backups are maintained for the three days to allow for restoration in the case of catastrophic failure. For less severe issues we maintain roll-up backups in diminishing levels of granularity for a 3-month window, within which we can restore data if required.

Inquiries

You can send security-related questions or concerns to [email protected].

Did this answer your question?