Does Payspace utilise network segmentation to limit access to sensitive data to specific network zones, thereby reducing the risk of a widespread network compromise?
This applies to all PaySpace editions.
Payspace utilises network segmentation to limit access to sensitive data to specific network zones, thereby reducing the risk of a widespread network compromise (i.e. users do not have access to the backend). Only a select few users will be able to access the back end via VPN and RBAC along with MFA.
Related Articles
Is data encrypted at rest and during transport?
This applies to all PaySpace editions. All customer data is stored in South Africa and Europe (DR) and is encrypted at rest. PaySpace is powered by a single instance, multi-tenant architecture, in which all users and applications share a single, ...
Why does a Company or Business Partner level user not have access to a specific frequency?
This feature is available on all PaySpace editions If a Company or Business Partner level user cannot access a specific frequency in a company, verify whether they were granted permission to access it on their security user profile. Navigate > ...
Security | Maintaining Security Roles
Overview Once a Security Role has been added, you will need to specify the access required on screens and/or fields within the system. Edition This feature is available on all PaySpace editions. Navigation Navigate > Config > Security > Security ...
Can a customer's database be accessed by another customer?
This applies to all PaySpace editions. No. PaySpace is powered by a single instance, multi-tenant architecture, in which all users and applications share a single, common infrastructure i.e. database and code base, but is logically and uniquely ...
How can the permissions from different security roles be applied within each company when a company level user has access to multiple companies and is assigned different security roles in each one?
This feature is available on all PaySpace editions. If a company level user is linked to multiple security roles, access will be allowed as specified in the security role with the least amount of access across all companies that the user has been ...