• Tiếng Việt
  • English

Application Security

Confidently Access NetSuite From Anywhere

Home / Application Security

Protect Yourself Against Phishing Scams

NetSuite knows it’s at the heart of its customers’ daily business operations. NetSuite provides a host of advanced functionality to secure the application including role-based access, strong encryption, robust password policies and more. NetSuite adds further layers of security such as application-only access and restricting access to only certain IP addresses to provide complete confidence and peace of mind.

Benefits

  • Easily manage permissions, access to functionality, and access to data for all employees using role-based access
  • Confidently access NetSuite from anywhere through 256-bit TLS encryption
  • Utilize advanced security technology such as location-based IP address restrictions
  • Continually enforce access to NetSuite with password complexity and password renewal rules.

Key Features

Role-Level Access and Idle Disconnect

  • Role-based access control ensures users can only use data and application functionality that is related to their responsibilities
  • NetSuite automatically locks the application when idle connections are detected to prevent unauthorized access
  • A complete audit trail ensures changes to every transaction are tracked with user login details and a timestamp.

Strong 256-Bit Encryption

  • NetSuite provides 256-bit TLS encryption for user login and all subsequent data the same level of encryption used by online banks

Application-Only Access

  • NetSuite ensures users can only access the application, not the underlying database

IP Address Restrictions

  • IP address restrictions further minimize access to a user’s account
  • Easily configure to ensure only specific computers and/or locations can access NetSuite.

Strong Password Policies

  • NetSuite provides fine-grained password configuration options—from minimum password length and complexity to timeframe-based password expiration
  • Supports password policies to ensure that new passwords vary from prior passwords
  • Provides complexity rules to ensure passwords have a combination of numbers, letters and special characters
  • NetSuite accounts are automatically locked out after unsuccessful login attempts
  • For additional access control, NetSuite optionally supports multifactor authentication using a simple physical token to further minimize unauthorized access.

Protect Against Phishing

Users of online services are often targets of cybercrimes and security threats, including fraudulent “phishing” emails that attempt to lure people into supplying personal or company information such as credit card numbers, user login identities and passwords, financial account details and Social Security numbers.

Report Security Concern

Forward any suspicious email that uses NetSuite’s name to: security@netsuite.com

Learn About OneWorld Global Business Management

  • Business requirements: The ERP system should meet your organization’s business needs and align with your operational processes.
  • Scalability: The system should be scalable to meet your organization’s future needs, including growth, expansion, and changing business requirements.
  • Customization: The system should allow for customization to meet specific business needs and integrate with other systems.
  • Integration: The ERP system should integrate with other systems and applications your organization uses, such as CRM, HR, accounting, and inventory management.
  • Ease of use: The system should be user-friendly and easy to use, reducing training costs and ensuring a smooth transition for employees.
  • Cost: Consider the total cost of ownership, including licensing, implementation, training, and ongoing maintenance costs.
  • Security: The ERP system should have robust security features to protect sensitive data and prevent unauthorized access.
    Vendor reputation: Choose a reputable vendor with a proven track record of delivering quality ERP systems and excellent customer support.
  • Support & maintenance: The vendor should offer reliable support and maintenance services to ensure smooth system operation and minimize downtime.
  • Industry-specific features: The ERP system should have industry-specific features that meet your needs, such as compliance with regulatory requirements or specific reporting capabilities.
  • Experience and expertise: Choose a vendor with a proven track record of delivering successful ERP implementations. Look for reviews, case studies, and references to evaluate the vendor’s experience and expertise.
  • Project management methodology: Check their project management approach and see how they manage risks, issues, and change requests.
  • Team composition: Ensure the vendor has the right team composition to deliver successful implementation, with skilled and experienced members having diverse expertise like functional, technical, and project management.
  • Customization capabilities: The vendor should have customization capabilities to meet your specific business needs and integrate with other systems.
  • Cost: Consider the vendor’s pricing structure, including implementation, training, and ongoing maintenance costs.
  • Training and support: Check their training and support processes and see how they will help you and your employees throughout the implementation and beyond.
  • Change management expertise: The vendor should have experience in change management, ensuring your organization can adopt the new system smoothly and efficiently.
  • Communication and collaboration: The vendor should have open and transparent communication channels and foster collaboration between their team and your organization.
  • Data security: The vendor should have robust security features to protect sensitive data and prevent unauthorized access.
  • Scalability: The vendor should have the capabilities to scale the system to meet your organization’s future needs, including growth, expansion, and changing business requirements