Protecting your Files

With iBase your assets and data are secure at all times. A sophisticated security model allows you to control exactly who has what kind of access to your content, whilst a comprehensive audit log tells you what's been going on.

Secure Environment

Secure Environment

iBase is hosted within Amazon's AWS cloud environment and is constantly tested to ensure that no-one can gain unauthorised access to your files or data. We periodically carry out penetration checks to make sure that our software meets the latest relevant PCI guidelines. We can also restrict access to your system to a range of IP addresses or domains if required.

Permissions and Roles

Our sophisticated security model allows you to set up the different levels of access that are required to your assets and associated metadata, allowing you to specify exactly who can upload, view, edit, download or share different assets, who can see or edit which metadata fields, who can carry out editorial or workflow-based functions or who can access the various administration functions of the system.

Permissions and Roles
External Applications

External Applications

Any authorised external application (such as a website or content management system) can also be granted the same variety of access to assets and metadata as can be granted to human users. By using these permissions in combination with different folders, you can dynamically control which applications can see or download which files.

Audit Log and Reporting

iBase includes comprehensive auditing of every action that is carried out, including details of the user, date & time, IP address, asset and success or failure of the action. This extends to uploading, downloading, searching and editing, and can be easily viewed either with the inbuilt reporting system, or by using a third-party application.

Audit Log and Reporting