About the importance of securing your Vertec installation and keeping it up-to-date.
Product line
Standard
|Expert
Operating mode
CLOUD ABO
|ON-PREMISES
Modules
Services & CRM
Budget & Phases
Purchases
Resource Planning
Business Intelligence
Vertec installation security is a dynamic and ongoing process that must be carried out continuously.
First of all, the following question arises: Is my Vertec accessible to third parties via the internet or not? This leads to the following scenarios:
When running Vertec in the Cloud Suite, Vertec is used directly from the cloud without on-premises server installation. Vertec operates the software in the cloud and is responsible for most of the security measures.
However, Cloud Suite customers must keep these two things in mind:
Customers of a Vertec On-Premises installation have two options to put their Vertec on the internet. Either they use the Web Access service or they put their Vertec Cloud Server on the Internet themselves.
In both cases, Vertec strongly recommends that you address the Password Security and 2 Factor Authentication described above, activate the additional protection mechanisms described below and always use the latest Vertec version.
We recommend activating or not deactivating these additional protections (whenever possible):
In all these cases, we recommend that you always use the most up-to-date Vertec version , but at least install every major release. Why is this so relevant? This has to be seen in the context of further technical development, because what might have been good enough three years ago is no longer good and vulnerable today. Like the encryption standards used on the Internet when carrying data, Vertec is constantly evolving. Older Vertec versions should therefore no longer be used.
Customers who place their Vertec on the internet independently must, in addition to the measures mentioned above, also ensure:
An On-Premises installation that is not connected to the internet is the least common. Only in this case older versions of Vertec are acceptable and passwords of less importance.
The key to a secure password is its length: it is at least ten digits long, consists of upper and lower case letters, numbers, and special characters. Ideally, it is not a “real” word in the dictionary and does not relate to the user. Different passwords should be used for each service, and password generators should be used to create them. Moreover, passwords should never be written down or stored in plain text on storage media. Instead, password managers should be used to manage them, and passwords stored in browsers secured by a master password.