Xignal has your security needs covered. Xignal has been designed from the outset as a secure environment for collaborating on sensitive S1000D documentation. Many of the security provisions are designed in, while additional security is achieved through the specific configuration of the hosting. Xignal runs on the world's most trusted servers and we encrypt all data between our users and our servers using a secure HTTPS/SSL connection, giving you assured data security wherever you’re logging in from.

API authentication and encryption

API authentication and encryption

Our API endpoints are secured with powerful encryption technology that ensures all data remains confidential and cannot be tampered with

Authentication policies

Authentication policies

Strong authentication policies are adopted to ensure only the right users have access to the data they need

Encryption at rest

Encryption at rest

Data stored on cloud (at rest) is encrypted and secured with 256-bit AES encryption to prevent unauthorised access and data compromise

Encryption in transit

Encryption in transit

Data travels over an encrypted SSL connection which protects your content against any intrusion and fraudulent access

Audit logging

Audit logging

Audit logging keeps a detailed record of everything that happened: who, what, when and where

Backup and disaster recovery

Backup and disaster recovery

Our cloud hosting includes backup and disaster recovery measures that guarantee the recoverability of your information

Man-in-the-middle (MITM) prevention

Man-in-the-middle (MITM) prevention

Secure and authenticated connections between data sender and recipient

Multi-factor authentication

Multi-factor authentication

Protects your account from hackers and any unauthorised access attempts using one time passwords (OTP) or Google Authenticator

Role-based authorization

Role-based authorization

Our predefined roles and permissions use a powerful paradigm for controlling access to your critical data and resources. We also provide an intuitive interface so that you create your own custom roles

Secure credential storage

Secure credential storage

Your passwords and other sensitive data are held securely using a hashing algorithm

Session timeouts

Session timeouts

Your session can automatically expire for added protection against prying eyes. Customisable pre-set session timeouts for your organisation

Database segregation

Database segregation

No two customers ever share the same database for any data held in the system. There is no possibility of another organisation seeing your data

Contact us

We are happy to discuss more details of our security provisions directly with you.