Data Protection & Encryption

Your procurement data is protected with industry-leading encryption and comprehensive data protection policies.

Encryption standards

Encryption at Rest

All data stored in our systems is encrypted using AES-256 encryption, the same standard used by banks and government agencies.

Encryption in Transit

All data transmitted between your systems and Aerium is protected with TLS 1.3, ensuring secure communication at all times.

Key Management

Enterprise customers can manage their own encryption keys or use our secure key management service with automatic key rotation.

On-Premise Deployment

For organizations with strict security requirements, we offer on-premise deployment options so your data never leaves your infrastructure.

Data protection policies

Flexible Deployment Options

Choose between our secure cloud infrastructure or deploy on-premise within your own environment. We adapt to your security requirements.

Data Residency

Choose where your data is stored. We offer data residency options in the US and Canada, or keep it entirely on your own servers.

Data Isolation

Your data is logically isolated from other customers with strict access controls and separate encryption keys, or fully isolated with on-premise deployment.

Data Portability

Export your data at any time in standard formats. Your data belongs to you, and you can take it with you if you leave.

Access controls

Role-Based Access Control

Define granular permissions based on job functions. Control who can view, edit, or approve procurement data at every level.

Custom Permission Sets

Create custom roles tailored to your organization's structure. Assign permissions by department, project, or spend category.

Approval Workflows

Configure multi-level approval chains with automatic routing based on spend thresholds, categories, or business units.

Audit Logging

Complete visibility into who accessed what and when. Every action is logged and available for compliance reporting.