Skip to content

Security

Software that’s secure by design, so you can focus on your mission.

Completely secure — and completely compliant.

Our software meets current HUD Domestic Violence, HMIS and Social Security Administration data management and security protocols, as well as required FERPA and HIPAA standards. We design our products to adhere to the highest industry standards, so you can spend time focusing on what really matters —your mission. 


24/7/365 monitoring

Continuous monitoring with redundant infrastructure to maintain uninterrupted operations.

Secure case management

Our software systems are certified SOC 2 Type II and HIPAA compliant.

Powerful intake capabilities

Data is automatically encrypted while in transit between your computer and our servers — and while at rest.

With Apricot, your security is our priority.

Your security, and the security of the people you serve, are of the utmost importance. Rest assured that your system is secure and compliant with unrivaled technology from Social Solutions.

Benefits

Keep your information secure, always

We design our products to restrict sensitive information to only those who need to see it.


Simple, easy, intuitive

No matter your comfortability with technology, Apricot is easy to learn and navigate. 

Data security


Usernames and passwords prevent unauthorized access.
Password requirements are configurable so that organizations can implement internal controls, including multi-factor authentication. Additionally, users are assigned permissions based on their roles.

Rest assured with secure data storage.
Data is stored using redundant AWS hardware technologies, Social Solutions fault-tolerant software and journaling file systems.

Encryption


Leading technology keeps your information safe.
State-of-the-art equipment and technology safeguard the confidential nature of your data. 

Security is our top priority.
Data is automatically encrypted while in transit between your computer and our servers. Additionally, users access Apricot® software web application servers via a secure HTTPS connection.

Amazon Web Services (AWS) server security


We take extra steps to prevent unauthorized access.
IDS, virus scanning, automated system checks and remote logging guard against unauthorized access. Data centers are staffed 24/7 by trained security guards.

AWS implements surveillance and control systems.
AWS implements electronic surveillance and multi-factor access control systems to secure its data centers. Well-architected security reviews are conducted in conjunction with AWS Solutions Architect.

Ready to strengthen your impact?
Watch the product demo.