Security

We understand that security is extremely important to you.  Cloud security for Turnsmith software is the highest priority. When you choose Turnsmith management you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. Contact us today to learn why we are the ultimate inventory system.

     

 
    Privacy   Protecting your privacy is a top priority for us. Your company information stored on the Perfect Inventory platform is kept private.  We will never share your company information with non-applicable 3rd parties.

Privacy

Protecting your privacy is a top priority for us. Your company information stored on the Perfect Inventory platform is kept private.  We will never share your company information with non-applicable 3rd parties.

     

 
    Encryption   At minimum, company data is encrypted at rest using 256-bit Advanced Encryption Standard (AES). This is the same level of encryption used by banks.  

Encryption

At minimum, company data is encrypted at rest using 256-bit Advanced Encryption Standard (AES). This is the same level of encryption used by banks.  

     

 
    Architecture   We have architected a fully modular redundant system designed to scale to any number of users and handle any significant outage.  With no masters or single points of failure, our distributed systems is built upon mode

Architecture

We have architected a fully modular redundant system designed to scale to any number of users and handle any significant outage.  With no masters or single points of failure, our distributed systems is built upon modern clustering technologies to ensure high availability. The Perfect Inventory engineering team has taken every measure to ensure the network and server infrastructure remains resilient and secure. 

     

 
    Security Process   Security process is a key element of infrastructure optimization and must be part of the design criteria for all technologies.  At Perfect Inventory our compliance team strictly adheres to all major privacy standa

Security Process

Security process is a key element of infrastructure optimization and must be part of the design criteria for all technologies.  At Perfect Inventory our compliance team strictly adheres to all major privacy standards as part of our commitment to provide the best product to our clients.  Our security management process is based on the ISO 27001 standard, combined with the policies and procedures recommended by NIST.

     

 
    Physical Security   Our state-of-the-art security measures use industry-leading physical security protocols that are compliant with a comprehensive portfolio of standards and regulations.  All of Perfect Inventory production data is

Physical Security

Our state-of-the-art security measures use industry-leading physical security protocols that are compliant with a comprehensive portfolio of standards and regulations.  All of Perfect Inventory production data is stored with Amazon Web Services (AWS).  We chose AWS primarily because of their ongoing commitment to provide the best cloud hosting solution.  All Perfect Inventory data centers are compliant to the highest possible security standards.  

Bitmap.png

Compliance

ISO 27001/27018

We comply with ISO/IEC 27001 and ISO 27018, which is the only auditable international standard, and defines the requirements for an Information Security Management System (ISMS).  The standard is designed to select adequate and proportionate security controls.