Your resource and project data, and financial details stay encrypted, compliant, and completely under your control.
At eResource Scheduler, we know that scheduling resources on projects also means managing
trust. That’s why data security isn’t a department; it’s a design philosophy woven into our architecture, our culture, and our code.
Our users deserve clarity, not fine print, so our security practices are transparent, audited, and
always improving.
Your data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption standards. Sensitive details like login credentials and tokens are hashed using Scrypt and salted, ensuring nothing readable leaves our servers.
Granular role-based access control (RBAC) lets you define who can view, edit, or allocate resources. Combine that with multi-level permissions and custom user roles, and you get airtight visibility without accidental overreach.
Multi-factor authentication (MFA) and secure single sign-on (SSO) options protect your account access. Session management and IP-based restrictions keep unauthorized logins at bay.
Hosted on Google Cloud Platform (GCP) with email servers on AWS—both enterprise-grade environments. Continuous monitoring of latency, availability, and system health ensures uptime and performance never miss a beat.
eRS is SOC 2 Type II certified, GDPR compliant, and built around globally recognized security frameworks. External audits validate our policies on privacy, access, and data integrity, giving you confidence that your operations meet enterprise-grade standards.
All employees undergo background verification, mandatory security training, and least-privilege access enforcement. Third-party integrations and vendors are pre-screened for compliance and required to match our own data-handling standards.
Daily automated backups with 3-point redundancy, encrypted and stored in separate data centers. We routinely test our disaster recovery plan to ensure business continuity even in extreme scenarios.
Regular third-party penetration tests and vulnerability assessments keep eRS ahead of emerging threats. Every finding is logged, remediated, and verified because the best defense is proactive.
You own your data—always. We never sell, share, or repurpose customer data. You can request export or deletion anytime, and we honor data retention policies that fit your organization's compliance needs.
Security isn’t static, and neither are we. As threats evolve, we constantly refine our
infrastructure, update our policies, and strengthen controls. Because your trust deserves our full
attention, 24×7.
Found a potential vulnerability? Report any issue to support@enbraun.com.
Each customer’s data is logically isolated within our database architecture. Access is tightly controlled through authentication layers and role-based permissions, ensuring no cross-account visibility or accidental data exposure.
Yes. Every team member completes mandatory onboarding and annual refresher training on data protection, phishing awareness, and secure development. Security awareness isn’t optional—it’s part of the job description.
Never. Customer data is used solely to deliver and improve the service you use. We don’t sell, share, or mine user information for advertising or third-party analytics. Your data remains yours—always.
When you close your eRS account, your data is securely archived for a short retention window before being permanently deleted from all live and backup systems, following verified deletion procedures.
All eRS data is hosted on Google Cloud Platform (GCP), using secure data centers with multi-layered physical and digital protections. AWS provides state-of-the-art security certifications and regional hosting options to meet compliance needs.
Yes. All APIs use secure token-based authentication. Access scopes are restricted by design, ensuring integrations only perform actions explicitly permitted by you.
eRS layers multiple defenses to prevent unauthorized access. Multi-factor authentication (MFA), secure single sign-on (SSO), CAPTCHA prompts, and account lockouts safeguard logins. Role-based permissions, IP blacklists, and session timeouts further minimize exposure, while continuous monitoring detects and blocks any suspicious activity in real time.
Plan Smarter. Schedule Faster.
Join thousands already using eResource Scheduler to align teams, time, and tasks seamlessly.