
Security
Software that’s secure by design, so you can focus on your mission.

Completely secure — and completely compliant.
Our software meets current HUD Domestic Violence, HMIS and Social Security Administration data management and security protocols, as well as required FERPA and HIPAA standards. We design our products to adhere to the highest industry standards, so you can spend time focusing on what really matters —your mission.
24/7/365 monitoring
Continuous monitoring with redundant infrastructure to maintain uninterrupted operations.
Secure case management
Our software systems are certified SOC 2 Type II and HIPAA compliant.
Powerful intake capabilities
Data is automatically encrypted while in transit between your computer and our servers — and while at rest.
With Apricot, your security is our priority.
Your security, and the security of the people you serve, are of the utmost importance. Rest assured that your system is secure and compliant with unrivaled technology from Social Solutions.
Benefits
Keep your information secure, always
We design our products to restrict sensitive information to only those who need to see it.
Simple, easy, intuitive
No matter your comfortability with technology, Apricot is easy to learn and navigate.

Data security
Usernames and passwords prevent unauthorized access.
Password requirements are configurable so that organizations can implement internal controls, including multi-factor authentication. Additionally, users are assigned permissions based on their roles.
Rest assured with secure data storage.
Data is stored using redundant AWS hardware technologies, Social Solutions fault-tolerant software and journaling file systems.


Encryption
Leading technology keeps your information safe.
State-of-the-art equipment and technology safeguard the confidential nature of your data.
Security is our top priority.
Data is automatically encrypted while in transit between your computer and our servers. Additionally, users access Apricot® software web application servers via a secure HTTPS connection.


Amazon Web Services (AWS) server security
We take extra steps to prevent unauthorized access.
IDS, virus scanning, automated system checks and remote logging guard against unauthorized access. Data centers are staffed 24/7 by trained security guards.
AWS implements surveillance and control systems.
AWS implements electronic surveillance and multi-factor access control systems to secure its data centers. Well-architected security reviews are conducted in conjunction with AWS Solutions Architect.
