Your Security is Assured with Sherm

1.0 Best-in-Class Security

Your organisation’s data is of huge importance to us. That’s why we maintain a highly-secure and reliable service – because it is vital that your data is always secure from unauthorised access.

2.0 Online Access Security

Access to Sherm is protected via a username and password. All usernames and passwords must comply to Sherm’s username and passwords convention. Only when you have successfully logged into Sherm will you be able to access your organisation’s data. All Sherm accounts are given a unique ID key by Sherm internally to ensure only your organisation is viewing your data.

3.0 SSL Encryption

Sherm uses SSL (Secure Socket Layer) to encrypt the information passing between the browser and the server. This stops hackers from accessing your data while it travels over the internet between Sherm and you.

4.0 Controlling Your Employee's Access

In Sherm you can limit what each person in your organisation can do, whether viewing, editing, adding and deleting through the User Role Management.

5.0 Data Storage

The Sherm database is managed on a fully redundant hardware platform where there is no single point of failure. In the event of a hard disk failure, the system will keep working with no data loss. The hard disks can be hot-swapped meaning that a technician can replace a faulty drive while the storage system is still working without data loss.

6.0 Sherm's Hosting Environment

Sherm is hosted by Web Hoster.  The data centre is based in Brisbane and is ISO 27001 certified and managed 24/7.

7.0 Backup & Recovery

Your organisation’s data is of very high importance to us. We have several mechanisms in place to ensure that should a disaster occur; we can recover quickly with minimal disruption to your Sherm service.