Security Statement

We take all the measures and best practices to keep our customers information safe and secure. Second CRM works with third-party security firms to perform regular security audits of our infra and application to discover and fix any potential security issues.

Reliable & Sophisticated Physical Security

Hosted at state-of-the-art cloud infra at Amazon AWS and Google Cloud in Singapore. Both data centers and network architecture are built to satisfy the requirements of the most security-sensitive organizations.

Security Hardening: All servers on our Second CRM cloud are hardened for security and patched on regular basis. This way, we ensure your data stay away from any unauthorized access.

Platform Level Firewalls: The privacy of your data – and it is your data, not ours! – is a big deal to us. This is why we protect our hosting platform with super strong firewalls, opening access to only authorized users and optionally from a specific location. We log access to all accounts by IP address, so we can verify unauthorized access (for as long as the logs are kept).

Hybrid Cloud Architecture

Separate Database: Second CRM don’t store entire data for its customers in ONE single database, we maintain separate database for each customer for full data isolation, offering best security and confidence for our customers.

Data Resiliency & Backups: All data is backed up automatically and kept safe and secure on our servers and uses the same encryption technology (2048-bit SSL) used by the world’s top business applications.

Offline Data Extraction: Second CRM provides extraction of entire database and upload to Customer servers, on monthly basis at no extra cost, offering complete peace of mind, for any unforeseen circumstances

Best-in-class Application Security

Granular Access Control: Second CRM provides a flexible, layered security framework that lets you share different data sets to different users, using profiles, roles, groups, rules, etc. Administrators can configure various sharing access levels.

Cookie Management: Second CRM provides each User in your organization with a unique user name and password that must be entered each time a User logs on. Second CRM issues a session “cookie” only to record encrypted authentication information for the duration of a specific session. The session “cookie” does not include either the username or password of the user. Second CRM does not use “cookies” to store other confidential user and session information, but instead implements more advanced security methods based on dynamic data and encoded session IDs.

Second CRM Private Cloud

For customers on a dedicated server, would be completely isolated from everything else ensuring the peace of mind and ultimate security. For more information, reach us at

For any other security related concerns, drop us a message to