We designed Populi for security.
Our technology choices, programming decisions, and development standards all work to keep your college’s information private, safe, and secure.
Secure hardware
Populi’s servers are stored in an SSAE 16 Type II compliant data center that is physically secured behind a battery of compartmentalized security zones with biometric access controls. Numerous security, power supply, and infrastructure redundancies layer on additional safeguards.
Daily backups
Security isn’t just about preventing unauthorized access; Populi also actively protects your data against loss. Daily, weekly, and monthly data “snapshots” back up all your information in a fully-encrypted “cloud” in real-time.
Encryption
Your computers access Populi over 256-bit SSL-encrypted connections. That’s the same technology that secures things like online bank transactions.
Proactive monitoring
Populi keeps the software and your data behind secure firewalls and actively monitors for hacking or probing attempts.
Design standards
We built Populi on the open-source “LAMP” stack (Linux, Apache, MySQL, PHP), availing you of the same powerful, secure technology undergirding web companies like Google, Vimeo, Facebook, and Amazon.
Responsive development
Keeping a close eye on emerging internet security threats, the Populi team quickly updates the program with safeguards and security patches. Security is an ongoing process here, and we’re continually strengthening Populi’s defenses.
Strong passwords
Populi requires hacker-resistant, alphanumeric passwords, considered to be one of the best defenses against hijacked user accounts—which are, in turn, the leading cause of security breaches.
User access privileges
Populi’s user privilege levels and per-item visibility settings ensure that sensitive data is kept confidential.
Timed logouts
The system automatically logs users out after a short period of inactivity. That helps prevent unauthorized users from accessing an account on an unattended computer.
Change log
Populi keeps a detailed change log on important records—recording the change, who performed it, and when.
Thanks!
We’ll be in touch soon.