KEEPING YOUR INFORMATION SAFE AND SECURE

Propel Platform Security

At Propel we understand the importance of earning and maintaining your trust. That’s why security is a cornerstone of everything we do.

Our CTo explains
A Secure Enterprise System
Our architecture ensures users accessing your system are who they say they are, and only for the data they need.
You Own Your Data
Propel employees only get access if you provide it and only for the specified duration of time.
Built on Salesforce
Enhanced compliance standards, robust security measures, and scalability to meet your evolving needs.
Application Security
Flexible Record Sharing and Field Level permissions to meet specific customer requirements.

Layers of Security

Data security isn’t one-size-fits-all. Propel safeguards your information through a multi-layer approach, protecting it from the moment it enters our system to the time it’s at rest within our data centers.
Organizational & User
Organizational security to protect your system against unauthorized access. 
Application & Data
Policies and configurations embedded in your object, field, and record levels creating multiple security layers.
Infrastructure
We are built on the world's top rated platform, with security trusted by over 150,000 customers world wide. 
Organization & User Layer

Control who has access to data and what they can do with it.

Authentication
Open ID connect protocol allows Propel to connect to all market leading solutions, or use your existing authentication tool.
Single Sign On (SSO)
Keep your login secure with Propel. We’ll get your SSO set up in just a few clicks for a seamless layer of added protection.
Authorization
Clearly define what users can and can't do to prevent accidental or malicious damage by users.
Two-Factor Authentication
Use a second form of verification, such as a mobile device code, email or a biometric marker, in addition to a password.
Password Policies
Enforce minimum length, complexity, expiration, and lockout policies after multiple failed attempts.
User Session Expiration
Inactive user sessions are terminated after a predefined period (default is 2 hours) to prevent unauthorized access. 
Principle of Least Privilege
Disable permissions and set expirations as needed so each user only has access to the tools they need to do their job.

Application &
Data Layer

Assign different data sets to specific groups. Propel’s flexible, layered sharing model ensures:
Confidentiality
Only authorized people can access your data.
Integrity
Your data is accurate and hasn’t been tampered with.
Availability
Authorized people can access data whenever they need it.
Control access at the following levels
Organization
Organization level permissions allow you to maintain a list of authorized users, set password policies, and limit logins to certain hours and locations.
Object
Object level permissions allow you to control who can perform CRUD (create, read, update, delete) operations on records of a particular object type. Object permissions let you grant read-only access to Items and Documents to contract manufacturers (CMs) and suppliers, without allowing them to create, edit, or delete Items.
Record
Record level permissions allow you to restrict the individual object records a user is allowed to see. Propel’s unique sharing rules define exactly who gets access to which records, eliminating the need for manual micromanagement and ensuring consistent, secure data sharing.
Field
Field level permissions control access to certain fields, even if a user has access to the object. A specific field can be marked to determine sharing and even hide who has access. This way, a third party such as a supplier doesn’t learn who other suppliers are.
Infrastructure
Propel uses multiple security levels to protect critical systems and assets against cyber threats and physical dangers
Network
Creating a barrier allowing only authorized traffic with external and internal firewalls, intrusion detection systems, and regular penetration testing used to monitor, identify, detect and address suspicious behavior.
Data Center
Data center security is a multi-layered approach to safeguarding the physical facilities, IT infrastructure, and the data stored within a data center. It ensures the confidentiality, integrity, and availability of this critical information.
Physical
24/7 manned security, biometric scanning, individually controlled cages, video surveillance, environmental controls, notifications, and on-screen dashboards are all in place to control access to servers where your data is stored.
Encryption
You are the only one who should see your data. That’s why it's protected whether in motion or at rest:
Data Encryption
When data is in transit between the server and interface, and between servers, Propel uses the industry-standard protocols TLS 1.2 and HTTP Strict Transport Security (HSTS) for encryption.
Encryption at Rest
All data is encrypted at rest by default on Hyperforce. In addition standard and custom fields and in files and attachments or data in our platform search indexes using an advanced HSM-based key derivation system.
Shield
Propel offers Salesforce Shield Platform Encryption for added security. Providing granular control over data encryption to manage and rotate encryption keys as needed to meet stringent compliance requirements.

Cyber Security

As an independent software vendor (ISV) on the Salesforce platform, Propel’s applications are tested by Salesforce on a periodic basis. This process is called the AppExchange Security Review. The review tests the security posture of Propel, including how well it protects customer data, and identifies any security vulnerabilities that a hacker, malware, or other threat can exploit.

Here’s a small sampling of the common security threats that Salesforce Security Review tests for.

  • SOQL and SQL injection
  • Cross-site scripting
  • Non-secure authentication and access-control protocols
  • Vulnerabilities specific to the Salesforce platform, such as record-sharing violations

Government Cloud

Propel is certified to run on the Salesforce Government Cloud allowing  public sector organizations to innovate securely and compliantly. The Salesforce GovCloud has been designed to provide the US government and government contractors with privacy and high levels of performance, reliability, and security while helping them meet authorizations such as IRS 1075, FedRAMP High, and DoD Impact Levels.

With GovCloud, Propel runs on an isolated, dedicated environment for US government agencies and contractors. This allows users to store and process sensitive data with confidence and while staying compliant with the regulations. The Salesforce GovCloud is built on top of AWS GovCloud (US), the market leading FedRAMP-authorized cloud to adhere to the most stringent US government security and compliance requirements.

Forensics

The Propel platform supports auditing tools that provide important information for diagnosing potential security issues or dealing with real ones. The following information is tracked, logged and can be reported on.

  1. Login History: list of successful and failed login attempts 
  2. Record creation and modification: who created or modified records and when
  3. Field-level updates: Propel tracks field-updates such as before and after value of a field, who updated and when.

Additionally, a Propel administrator can use the Salesforce Health Check to identify and fix potential vulnerabilities in your security settings, all from a single page. A summary score shows how your org measures against a security baseline like the Salesforce Baseline Standard.