Security and Privacy
We believe that your faith in Epsis and our Enify solution is built on trust. That trust is built on transparency. Here you will find our approach in simple language with links to more detailed information if needed.
Web Site Privacy
We track your usage of our web site in order to understand what aspects of our company and products interest you. This allows us to refine the structure and contents of our web site. We don’t know who “you” are in any detail beyond an assigned ID to track which pages you visit. These details are stored and managed within “cookies” stored within your web browser.
Our Customer Data
Whether you are a potential customer or an active user of our services we will store data that you have shared with us. We need this to contact you about our services, provide support, understand how you are using our products or to send you information you have requested. We never sell or trade your data as we believe your data belongs only to you.
All customer data is stored within a single solution in order to manage it simply and comprehensively. We utilise the HubSpot suite for customer management which offers a very secure and solution; trusted by over 100,000 customers in 120 countries. For more information on this solution about security and privacy you will find it on the HubSpot Security Program page.
If you are an active user of our software, additional data is stored for it to work. We extend the same transparency and protections to that data as any other. See our website's Enify Security & Privacy section for more detailed information.
Enify Security and Privacy
Epsis, the creators of Enify, has an uncompromising commitment to your privacy & security, as it is the only way to build lasting trust with our customers. We believe in using simple language to be transparent about how Enify secures itself, the information it can collect, and what happens to that information. Please take the time to read some of the detail below to stay informed and protect yourself.
Epsis does not have 3500 cybersecurity experts nor the billions of dollars to deliver a fully secured cloud environment. Luckily Microsoft does with its Azure Cloud services. By utilising Microsoft’s service offering we can provide you with “best in class” security and privacy at a reasonable cost. We utilise the recommended security practices within a modern programming framework to ensure we fully benefit from Microsoft’s investment.
To learn more about Azure security & privacy see Microsoft’s site
Or to deep dive with their eBook “Trusted Cloud: Microsoft Azure Security, Privacy, Compliance, Reliability/Resiliency, and Intellectual Property”
Enify is both a cloud based application (Enify - all UI, your data & business logic) and a small program running on your PC that you are asked to install (Enify Engine – handling the windows on your desktop as directed by the Enify cloud based application).
Enify Engine is a small application that you are requested to install when you first start using Enify. A small background application sits in your system tray and takes secure, authorized commands from the main cloud-based Enify application.
Enify Engine does not hold any data itself. It is not aware of the contents of your boards and elements. Enify Engine is asked to open, relocate, and close programs by the Enify Web-based program and provides feedback on its success. The program runs with your permissions (not any elevated access) and is deliberately designed to have minimal functionality to reduce any security implications.
The only data collected by Enify Engine are log files located locally on your computer. These are used for debugging if you run into problems; Epsis cannot access them. The support team may ask you to send extracts of these logs if you'd like some help. You can find & review them quickly from the Enify Engine icon in your system tray (Right Click: "Get Logs").
Enify utilizes Azure Active Directory for authentication – both for the main Enify application and for any instructions sent to the local Enify Engine program.
This means that users will utilise Microsoft accounts to sign in. Keep your profile up to date, and regularly change your password. If possible, use the Microsoft Authenticator App to provide Multi-Factor Authentication (MFA) and avoid reliance on passwords as your only security mechanism.
To get recommendations and advice on how to secure your Microsoft account and get help signing in you will find help here: Get help with your Microsoft account.
Enify utilizes Azure Active Directory for authentication – both for the main Enify application and any instructions sent to the local Enify Engine program.
This means that users will utilize Microsoft accounts to sign in. Keep your profile up to date, and regularly change your password. Use the Microsoft Authenticator App to provide Multi-Factor Authentication (MFA) and avoid relying on passwords as your only security mechanism.
To get recommendations and advice on securing your Microsoft account and getting help signing in, you will find help here: Get help with your Microsoft account.
Keep your password secure. Keep your virus and malware protection up to date. Do not share your account. Always use Multi-Factor Authentication (MFA) if available. Do not hack or reverse engineer our software. Share elements & boards responsibly. Always stay security & privacy-aware.
Responsible disclosure: if you discover a vulnerability within Enify, please don’t share it publicly. Instead, contact our security team at email@example.com immediately. We review all security concerns brought to our attention and proactively approach these and other emerging security issues.
Keep your password secure. Keep your virus and malware protection up to date. Please don't share your account. Always use Multi-Factor Authentication (MFA) if available. Please don't use or reverse engineer our software. Share elements & boards responsibly. Always stay security & privacy-aware.
Responsible disclosure: if you discover a vulnerability within Enify, please don't share it publicly. Instead, contact our security team at firstname.lastname@example.org immediately. We review all security concerns brought to our attention and proactively approach these and other emerging security issues.
What data is stored in Enify?
Enify does not store data - only links (e.g., URL or file paths) to the information you want to use.
Who has access to my saved Elements and Boards?
Nobody can access the Elements and Boards if you don't share them. If you share, e.g., a Board where the receiver doesn't have access to the content, the program opening will let the user know.
What type of security does Enify use?
Enify uses Microsoft Azure login. You can read more about login in our help center.
Can you choose what functionality users are able to access?
In Enify, you can add different roles. One in your team will be granted Admin rights and can add roles with additional functionality. This is only available for subscribers.
Enify is a hybrid SaaS solution. What does that mean?
Enify is web-based. To give you all available functionality, there is also a tiny application every user needs to download. This recognizes how many screens you have and running applications. You do not have to have Admin rights on your PC to download the Enify Engine.
What kind of support does Enify offer?
The types of support available to you depend on which Enify plan you purchase. The different support channels available are email, phone, chat and live. In Norwegian and English. Other languages can be available on request.
All subscribers has access to our help center where you can find user guides, help and documentation for admin- and end-users.