Data Protection & Encryption
Your procurement data is protected with industry-leading encryption and comprehensive data protection policies.
Encryption standards
Encryption at Rest
All data stored in our systems is encrypted using AES-256 encryption, the same standard used by banks and government agencies.
Encryption in Transit
All data transmitted between your systems and Aerium is protected with TLS 1.3, ensuring secure communication at all times.
Key Management
Enterprise customers can manage their own encryption keys or use our secure key management service with automatic key rotation.
On-Premise Deployment
For organizations with strict security requirements, we offer on-premise deployment options so your data never leaves your infrastructure.
Data protection policies
Flexible Deployment Options
Choose between our secure cloud infrastructure or deploy on-premise within your own environment. We adapt to your security requirements.
Data Residency
Choose where your data is stored. We offer data residency options in the US and Canada, or keep it entirely on your own servers.
Data Isolation
Your data is logically isolated from other customers with strict access controls and separate encryption keys, or fully isolated with on-premise deployment.
Data Portability
Export your data at any time in standard formats. Your data belongs to you, and you can take it with you if you leave.
Access controls
Role-Based Access Control
Define granular permissions based on job functions. Control who can view, edit, or approve procurement data at every level.
Custom Permission Sets
Create custom roles tailored to your organization's structure. Assign permissions by department, project, or spend category.
Approval Workflows
Configure multi-level approval chains with automatic routing based on spend thresholds, categories, or business units.
Audit Logging
Complete visibility into who accessed what and when. Every action is logged and available for compliance reporting.