Security in Quixy ensures that user access, application usage, and data handling are protected through built-in platform controls. These security measures help organizations safeguard sensitive information and maintain secure operations.
- Multi-Factor Authentication (MFA): Multi-Factor Authentication adds an extra layer of security during login by requiring users to verify their identity through more than one authentication factor—such as a password and a one-time verification code. This prevents unauthorized access even if user credentials are compromised.
- Single Sign-On (SSO): Single Sign-On allows users to access Quixy using their existing corporate identity provider credentials. With one secure login, users can access multiple applications without re-entering passwords, improving security and simplifying access management.
- PII Tagging: PII Tagging identifies and classifies fields that contain Personally Identifiable Information within Quixy applications. Tagging such data helps organizations enforce privacy rules, maintain compliance, and apply additional protections like masking or restricted access where necessary.
- Data Masking & Encryption: Data Masking hides encrypted data fields information from unauthorized users by partially or fully obscuring specific data fields, while Encryption ensures that data is stored and transmitted in a secure, unreadable format. Together, they protect personal and confidential information from misuse or exposure.
- IP Whitelist: IP Whitelisting restricts platform access to approved network locations by allowing only specific IP addresses or IP ranges to log in. This ensures that only trusted networks can access the organization’s Quixy environment, adding an extra boundary of protection.
- Sessions: Session Management allows administrators to control how long users can remain logged in and how active sessions are handled. This includes session expiry, auto-logout on inactivity, and limits on concurrent logins—helping maintain account security and reduce unauthorized access risks.
Each feature focuses on a specific aspect of access control, identity management, and data protection. You can navigate to individual features to learn more about their configuration and usage.