Project Management Menu
Systemic Security Risk Mitigation
Systemic security risk is a concrete operational challenge in enterprise
software, where interconnected workflows, dependencies, human activity
and malicious actors can allow errors or attacks to propagate. Traditional
reactive measures — patching, perimeter defences and incident response —
while essential, are no longer sufficient.
Adaptive embeds security into architecture, operational processes and
verification, transforming risk management into a proactive, measurable
practice.
Details of our New 5-Pronged Security Methodology can be found at:
Enterprise Grade Security or in the Products menu.
Security, Permissions & Controls
Security is placed front and centre. It is security by design and not an afterthought or wrap-around. Systems with security, permissions and access controls, built within each module, are far stronger.Secure Login: The fact users can login securely does not equate to a secure system. Why not? The right to log-in, is not the same as full data access across an entire system - we handle this with permissions and access controls. This also brings into question wrap-around, single sign-on products, as they do not automatically include access controls or internal controls.
A Sample of Key Security Measures
| Risk | Activity |
|---|---|
| Isolation by Design | Adaptive has minimal supply-chain risk as software is coded from scratch, with very few external dependencies. This is an entirely different set-up to the majority of software firms that all rush to integrate. Our decision is risk-based. Each client operates within a fully isolated environment, including its own database, unique encryption key and separate software modules. This limits risk propagation and ensures that incidents in one environment cannot affect others. |
| Permissions & RBAC | Security and operational RBAC (Risk-Based Assess Controls) are enforced at the module level and operate on a least-privileged basis. Users have access only to the areas and functionality relevant to their roles and sensitive actions require additional authorisations where appropriate. | During set-up our implementation team customise user roles and permissions to match your requirements.
| Key-Based Two-Factor Authentication | Passwords/PINs are never transmitted, stored or emailed. Users create their own PIN and they alone control its creation and reset, which significantly reduces social engineering risks. It is akin to bank-grade security. |
| AdaptiveMessaging | Reduce BEC (Business Email Compromise) by over 80% with a fully internal communication system, connecting internal staff, clients and suppliers. |
| Segregation of Insider Access | Developers, system administrators and operational staff operate in strictly segregated directories and workflows, with no cross-access to client data. |
| "Home-Cooked" Not "Ready-Made" | Adaptive offers "home-cooked" food rather than "ready-made" to focus on security, quality, control and facilitate customisation. |
| Enhanced Security & Ransomware Mitigation | Each client sits in a fully isolated environment, with sensitive data encrypted. No developers or system administrators have access to client data. The rationale: Some ransomware attacks occurred as insiders, with knowledge and access shared credentials. |
| Fraud Risk Mitigation | There are multiple Internal & External Fraud Risk Controls. |
| Proud to Ban Word Press (WP) From Our Servers |
For WordPress to be functional it relies on 3rd Party Plugins.
Our best guesstimate is these plugin developers care more about profit than security. To-date WordPress and its
plugins have suffered almost 29,000 vulnerabilities (up from 7,000 only 2 years ago). Its grow path is exponential.
It only takes a single attack to bring a system down.
"CVE.org" is a public database of vulnerabilities. Visit and search 'wordpress'. After search for "AdaptiveERP", "AdaptiveMessaging", "AdaptiveEComm", "AdaptivePPPM" or "AdaptiveDMS". Any mention of the word Adaptive relates to other well-known companies. On a daily basis "bots" scour all servers, to segment which do and do not run WordPress. They search for the WP Admin Login. This is a key concern with any OpenSource Software. Everybody knows login paths/urls. |
Request a demo or consultation
