Be prepared to audits of LGPD

Permanent deletion of data

Permanently delete the data of people who request this type of deletion from the system, meeting the requirements of the LGPD.

Access logs

See what all users logged in to the platform do (or did) on Ploomes via access logs to get a history of who accessed each data.

Security perimeter

Protect the data recorded in your account using a security perimeter system with market standards for data protection.

We take care of your dice

Cloud storage

Ploomes is hosted by the main cloud providers in the market in countries such as Brazil, the USA, and Europe. Thus, we guarantee geographical separation for each client in their particular country and compliance with local guidelines and laws.

Constant backups

We back up all data twice a day to secure locations so you don't lose anything.

Data storage

Database disks are encrypted at rest level, preventing malicious people from accessing the system.

plus security for you and your team

User passwords

Each user's password is stored in a key encryption service to protect your information from potential intruders.

Network perimeter

Keep the data of your customers, suppliers, and partners safe with a platform protected by Firewall and Web Application Firewalls (WAF).

Connections via HTTPS

All connections to our servers are made via HTTPS. That way, all communication is encrypted, shielding your data.

Control the access of wearers

Strong password policy

Ensure that all passwords created by users meet stricter security criteria.

Two-factor authentication

Further protect your account from outside intrusions with two-factor authentication via email or Google Authenticator.

Display rules

In addition to all information being stored by security perimeters with market standards, you can select who can have access to which types of data.

Development oriented to Excellencies

Safety-focused development

Our development team has review and testing processes so that each update is 100% secure.

Data Management Policy

Our access policies are well defined so that only authorized persons can access your data.

Constant server updates

Linux and Windows servers are constantly updated. Thus, the servers remain more secure and efficient in daily use.

Frequently Asked Questions

Quais medidas a Ploomes adota para garantir a segurança dos dados?

Our servers are constantly updated to keep the infrastructure secure. In addition, we use a firewall and WAF (Web Application Firewall) to protect the network perimeter.

A privacidade, criptografia e segurança de todas as conexões com os clientes é garantida por meio da comunicação HTTPS.

Também são realizados backups diários em locais seguros, separadamente da estrutura principal, garantido disponibilidade e redundância.

Where is Ploomes data stored?

Ploomes is a global company, so in order to comply with the data privacy standards of the countries in which it operates, it has servers in Brazil, the USA and Europe, ensuring geographical separation for each client in their particular country.

Sendo assim, a empresa trabalha com diferentes provedores de nuvem, em diferentes localidades, garantindo adequação às diretrizes e legislações locais.

Como a Ploomes lida com a LGPD (Lei Geral de Proteção de Dados)?

Ploomes acts in full compliance with the LGPD, adopting technical and organizational measures to protect the personal data processed on our platform. More details about how we collect, use, and store information can be found in our Privacy Policy.

How does user access control work within Ploomes?

The platform has several secure access mechanisms, such as strong password settings, login via Microsoft SSO, and two-factor authentication (MFA), via email, or through an app (such as Google Authenticator).

In addition, it is possible to create different user groups and configure specific permissions for each of them, limiting access to data and functionality only to those who really need it.

How does Ploomes protect user passwords?

Passwords are never stored in plain text, they are protected by cryptographic hashing algorithms, which makes their original content inaccessible.

How can I demonstrate to my company or auditor that my data is protected?

Os access logs they allow you to track who did what within the platform, which can be useful for internal or external audits.

Do you have other questions? Get in touch

Do you want to know how we can help you
to sell safely?