Skip to content
Security key icon on an orange background.


Software that’s secure by design, so you can focus on your mission.

A woman wearing glasses and a gray t-shirt reviews information on her computer with a coffee cup in the foreground.

Completely secure — and completely compliant.

Our software meets current HUD Domestic Violence, HMIS and Social Security Administration data management and security protocols, as well as required FERPA and HIPAA standards. We design our products to adhere to the highest industry standards, so you can spend time focusing on what really matters —your mission. 

24/7/365 monitoring

Continuous monitoring with redundant infrastructure to maintain uninterrupted operations.

Secure case management

Our software systems are certified SOC 2 Type II and HIPAA compliant.

Powerful intake capabilities

Data is automatically encrypted while in transit between your computer and our servers — and while at rest.

With Apricot, your security is our priority.

Your security, and the security of the people you serve, are of the utmost importance. Rest assured that your system is secure and compliant with unrivaled technology from Social Solutions.


Keep your information secure, always

We design our products to restrict sensitive information to only those who need to see it.

Simple, easy, intuitive

No matter your comfortability with technology, Apricot is easy to learn and navigate. 

Email icon on a green background.

Data security

Usernames and passwords prevent unauthorized access.
Password requirements are configurable so that organizations can implement internal controls, including multi-factor authentication. Additionally, users are assigned permissions based on their roles.

Rest assured with secure data storage.
Data is stored using redundant AWS hardware technologies, Social Solutions fault-tolerant software and journaling file systems.

A woman smiles while logging into her computer.
Encryption data icon featuring 0 and 1 repeatedly on a green background.


Leading technology keeps your information safe.
State-of-the-art equipment and technology safeguard the confidential nature of your data. 

Security is our top priority.
Data is automatically encrypted while in transit between your computer and our servers. Additionally, users access Apricot® software web application servers via a secure HTTPS connection.

A man's hands typing at a computer with a coffee cup and glasses off to the side.
Amazon arrow icon on a yellow background.

Amazon Web Services (AWS) server security

We take extra steps to prevent unauthorized access.
IDS, virus scanning, automated system checks and remote logging guard against unauthorized access. Data centers are staffed 24/7 by trained security guards.

AWS implements surveillance and control systems.
AWS implements electronic surveillance and multi-factor access control systems to secure its data centers. Well-architected security reviews are conducted in conjunction with AWS Solutions Architect.

Amazon Web Services facility.

Ready to strengthen your impact?
Watch the product demo.