TenderEyes | The Leading Bid Management Software

How secure is my data and Intellectual Property within TenderEyes?

Answer

Data

The TenderEyes application will be hosted on your existing Microsoft Office 365 infrastructure. Levels of security will already have been determined by your internal IT resources. Microsoft provides market-leading levels of IT security and resilience.

Intellectual Property

The TenderEyes team fully understands that at the time of submitting your Tender response, the documentation provided is the most up-to-date commercially sensitive Intellectual property you may have. Access within the TenderEyes application is controlled by a roles-based security model to determine who has access to the system at various permission levels. The TenderEyes application also has a Governance & Security Module that allows full audit trails, reporting and analytics of how authorised users are behaving within the application.

By |2022-08-08T10:17:42+01:00June 20th, 2022|

Share This Post With Others!

Go to Top