Crank up platform security with password policy, IP whitelisting, 2FA, and more


Achieving fail-safe security isn’t easy, especially in today’s cloud-first, perimeter-less, digital workplace. That doesn’t mean it isn’t possible.

We at are always adding and enhancing our security features to add that extra oomph of protection your platform needs. It’s time to trade the single layer of defense over your entire perimeter for multi-layer defense powered by strong password policies, identity-based whitelisting measures, and granular-level access controls.

That’s precisely the security ethos of

Platform security with 

Take a look at the best-in-class security features provides to keep hackers and business-impacting cyber threats at bay.

Password policy to cover your bases

Password policies ensure your teams have strict policies to comply with when setting up their passwords, making them harder to crack by brute force. When covering your bases, passwords are where you start. Users don’t give much thought when setting up passwords. They set one they can easily remember.

So, protect your first line of defense with a controlled level of complexity ranging across high, medium, low, and custom. Set password expiry durations prompting your customers to periodically reset their passwords, as older passwords are easier to intercept.

Password policies.png

Related reading: The ideal security stack - part one

2FA because two security layers are better than one

An extra step of verification doesn’t hurt if you want to enforce strong authentication measures. Even if a hacker gains access to your user’s personal devices or online accounts, they won’t be able to break your perimeter since they would be prompted to double verify their identity through OTPs or emails.

A highly secure platform is one where a password alone isn’t enough to hack it. 2-factor authentication enables that.

2 Factor Authentication.png

IP whitelisting to keep unauthorized users out

IP whitelisting is a feature that limits network access to trusted users. In a deny-by-default approach, allow only users with pre-approved IP addresses to access your enterprise applications and data.

Don’t assume trust within or outside the perimeter, ensure consistent authorization and authentication with IP whitelisting.

Related reading: The ideal security stack - part two

IP Whitelisting.png

Session timeouts to secure the last mile

Limiting the amount of time a user stays logged in can improve your security by leaps and bounds. When you define session timeouts for your platform and make your users log in regularly, you effectively mitigate session-based attacks. 

Never trust, always verify is the core principle of absolute zero trust environments. Setting session timeouts is one of the easy ways to do that.

Session timeouts.png

Make no compromises when it comes to security

Implementing these foundational elements of security is paramount to the protection of your data, devices, and of course, your clients’ trust. The proliferation of digital-first workplaces opens an avenue of threats not heard of, so give your platform the fail-safe security it needs. 

Give a try, we have everything you need to give your hackers a run for their money!

read moreicon


Mapping Your Calendar: 24 MSP Events to Attend in 2024

Discover key events for 2024, to unlock success in the MSP world! Mark your calendars to power your MSP journey with expert insights and networking.

7 minutes