Free Trial
Free Trial

Security that you can rely on

Your data is secure with Zilicus. The Zilicus platform runs on a proven infrastructure designed to provide maximum security performance and reliability. The security and integrity of your data are integral to the success of your company and the reputation of our business hence we take security very seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure.

Zilicus Solutions uses Amazon Web Services to provide its customers and partners with state-of-the-art perimeter, network, server, application and data security to ensure privacy and availability.


  • Zilicus Solution has hosted its server: website, application & database in world class secure server environment (hosted and professionally managed by Amazon Web Service, a recognized leader in application hosting) that uses a dedicated firewall to prevent interference with outside intruders. Amazon's AWS (Amazon Web Services) cloud architecture is certified as SAS70 Type II facility & it has also achieved ISO 27001 certification - known for reliable security measures. Please visit for more details.
  • We backup data daily to our off-site servers so you can be assured that nothing will be lost!
  • We are 100% committed to security and investing in the best technology and infrastructure

Server Security

  • All devices and software are protected by encrypted passwords and accessible only through encrypted communication paths

  • Application security model prevents customer data cross-over and ensures complete customer data segregation and privacy

Application Security

Encrypted Password

  • User authentication is controlled via unique and valid username and password combination that is encrypted using one way hash. (When users submit their username and password via One-Way Hash to Zilicus, a unique digital signature (or fingerprint) is created, which in turn identifies and authenticates the sender and the contents of the message.)

Role Based Access

  • All access within ZilicusPM is permission based - there are 4 types of roles available (Administrator, Portfolio Manager, Project Manager, Team Member) and these four types of roles define the level of access to set of data such as projects, tasks, files, events, milestones. Users can only access data that they have been given permission to access. For more details please refer to help guide of respective Zilicus application.

256-bit SSL

  • ZilicusPM application is 256-bit SSL encryption-enabled. What this means is that the data that you send between your computer and the Zilicus server is encrypted. Its like sending a coded message. If you bank online or use ecommerce sites then you have already used SSL. SSL will make it very difficult for unauthorized people to view information traveling between your computer and the Zilicus server.

  • Above security model is reapplied with every request and enforced for the entire duration of the session. 256 bit AES High Grade Encryption and Secure Socket Layer (SSL) protects your data using both server authentication and data encryption.

  • Zilicus does not use "cookies" to store other confidential information and have implemented advanced security methods based on dynamic data and encoded session IDs.

  • Virus Scanning. Traffic coming into Zilicus Servers is automatically scanned for harmful viruses using state of the art virus scanning protocols which are updated regularly.

Data Security & Backup

  • Application security model prevents customer data cross-over and ensures complete customer data segregation and privacy

  • Customer data is segmented from the Application layer providing additional security buffers

  • System-wide backups of all data to disk are performed daily

People Processes

Designing and running data center infrastructure requires not just technology, but a disciplined approach to processes. This includes policies about escalation, management, knowledge sharing, risk, as well as the day to day operations.

  • Select Employees. Only employees with the highest clearance have access to our data center data. Employee access is logged and passwords are strictly regulated. We limit access to customer data to only a select few of these employees who need such access to provide support and troubleshooting on our customers' behalf.

  • Audits. Audits are regularly performed and the whole process is reviewed by management

If you still have questions or concerns, please contact us at; we would be happy to address your concerns.