Platform

Solutions

Resources

Platform

Solutions

Resources

/

Product

/

Security

Data security at all levels

/

Product

/

Security

Data security at all levels

/

Product

/

Security

Data security at all levels

We keep your most important data protected

SOC 2 Type II

Abacum is SOC 2 Type II compliant, ensuring that your data remains secure and protected in the cloud.

SOC 2 Type II

Abacum is SOC 2 Type II compliant, ensuring that your data remains secure and protected in the cloud.

SOC 2 Type II

Abacum is SOC 2 Type II compliant, ensuring that your data remains secure and protected in the cloud.

GDPR compliant

Abacum is GDPR compliant, prioritizing data privacy and secure handling of your information.

GDPR compliant

Abacum is GDPR compliant, prioritizing data privacy and secure handling of your information.

GDPR compliant

Abacum is GDPR compliant, prioritizing data privacy and secure handling of your information.

Complete identity and access management control

SSO authentication

Abacum offers SSO and SCIM-based automatic user provisioning, ensuring access management that stays aligned with your Identity Provider.

SSO authentication

Abacum offers SSO and SCIM-based automatic user provisioning, ensuring access management that stays aligned with your Identity Provider.

SSO authentication

Abacum offers SSO and SCIM-based automatic user provisioning, ensuring access management that stays aligned with your Identity Provider.

User access controls

With group-based role assignment, Abacum lets you assign and manage user permissions easily across your workspace, all from a single, code-free interface.

User access controls

With group-based role assignment, Abacum lets you assign and manage user permissions easily across your workspace, all from a single, code-free interface.

User access controls

With group-based role assignment, Abacum lets you assign and manage user permissions easily across your workspace, all from a single, code-free interface.

Audit and traceability

Within Abacum, you can maintain a detailed history, offering full visibility into every edit event on your data models, spaces, or dimension mappings.

Audit and traceability

Within Abacum, you can maintain a detailed history, offering full visibility into every edit event on your data models, spaces, or dimension mappings.

Audit and traceability

Within Abacum, you can maintain a detailed history, offering full visibility into every edit event on your data models, spaces, or dimension mappings.

Data Encryption

All of Abacum's data is encrypted at all times, maintaining the latest standards in cryptography.

Data Encryption

All of Abacum's data is encrypted at all times, maintaining the latest standards in cryptography.

Data Encryption

All of Abacum's data is encrypted at all times, maintaining the latest standards in cryptography.

Our trust and security principles

Security

We place access controls to prevent potential system abuse, theft, misuse of software & improper disclosure of information.

Security

We place access controls to prevent potential system abuse, theft, misuse of software & improper disclosure of information.

Security

We place access controls to prevent potential system abuse, theft, misuse of software & improper disclosure of information.

Confidentiality

We ensure data confidentiality when access and disclosure is restricted to a specified set of persons or groups. This includes data disclosed as business sensitive.

Confidentiality

We ensure data confidentiality when access and disclosure is restricted to a specified set of persons or groups. This includes data disclosed as business sensitive.

Confidentiality

We ensure data confidentiality when access and disclosure is restricted to a specified set of persons or groups. This includes data disclosed as business sensitive.

Privacy

The collection, retention, use and disclosure of information conforms with criteria set by AICPA’s generally accepted privacy principles (GAPP).

Privacy

The collection, retention, use and disclosure of information conforms with criteria set by AICPA’s generally accepted privacy principles (GAPP).

Privacy

The collection, retention, use and disclosure of information conforms with criteria set by AICPA’s generally accepted privacy principles (GAPP).

Processing integrity

Our system delivers the right data at the right price and at the right time. Data processed is complete, valid, accurate, timely & authorized.

Processing integrity

Our system delivers the right data at the right price and at the right time. Data processed is complete, valid, accurate, timely & authorized.

Processing integrity

Our system delivers the right data at the right price and at the right time. Data processed is complete, valid, accurate, timely & authorized.

Availability

The accessibility of systems, products & services is aligned with the SLA set by both parties, with a delivery of minimum acceptable performance.

Availability

The accessibility of systems, products & services is aligned with the SLA set by both parties, with a delivery of minimum acceptable performance.

Availability

The accessibility of systems, products & services is aligned with the SLA set by both parties, with a delivery of minimum acceptable performance.

For all the decisions you need to make.

For all the decisions you need to make.

For all the decisions you need to make.