{"id":67,"date":"2019-07-24T18:35:57","date_gmt":"2019-07-24T18:35:57","guid":{"rendered":"http:\/\/107.180.69.126\/~beam\/?page_id=67"},"modified":"2023-09-06T18:03:10","modified_gmt":"2023-09-06T18:03:10","slug":"security-and-compliance","status":"publish","type":"page","link":"https:\/\/beamsoftware.com\/software\/security-and-compliance\/","title":{"rendered":"Security and Compliance"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container fusion-parallax-fixed hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:75px;--awb-padding-right:10%;--awb-padding-bottom:75px;--awb-padding-left:10%;--awb-background-color:rgba(0,0,0,0);--awb-background-image:url(&quot;https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/08\/Security-Header-1240x600_271588937.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;background-attachment:fixed;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:35px;--awb-padding-right:10%;--awb-padding-bottom:35px;--awb-padding-left:50px;--awb-bg-color:rgba(255,255,255,0.95);--awb-bg-color-hover:rgba(255,255,255,0.95);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><script>var t_code = \"DS-9230-2944-982\";<\/script>\n<script src=\"\/\/ds360.co\/track\/script.js\"><\/script><div class=\"fusion-text fusion-text-1\"><h1>Security and Compliance<\/h1>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#0060ae;border-color:#0060ae;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>Beam Software provides flexible hosting options for our clients using either the secure Microsoft Azure cloud or in your own single-tenant Azure data center. We understand the business-critical complexities of receivables management data security standards and help you meet the most rigid requirements.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-color:rgba(89,0,186,0);--awb-bg-color-hover:rgba(89,0,186,0);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling odd-container\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"width:calc( 100% + 0px ) !important;max-width:calc( 100% + 0px ) !important;margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:75px;--awb-padding-right:10%;--awb-padding-bottom:75px;--awb-padding-left:10%;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><h3 style=\"text-align: left;\">Cloud Services<\/h3>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#0060ae;border-color:#0060ae;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-4\"><p>BEAM was designed from the ground up for optimized performance in the Microsoft Azure cloud. Our platform integrates seamlessly with the robust security features of Microsoft Azure. We enable our clients to leverage the hardware and software expertise of Microsoft, providing a reliable and secure cloud hosting experience. Beam Software can even provision your organization additional server resources like CPU and memory on the fly to accommodate growing performance requirements.<\/p>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><\/div><div class=\"fusion-text fusion-text-5\"><h3 style=\"text-align: left;\">Granular Access<\/h3>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#0060ae;border-color:#0060ae;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-6\"><p>Provide access to account records or specific data fields with specific user roles, rights, and entitlements. BEAM gives you maximum control by providing granular user access to certain features, screens, and data fields. This restricted access provides heightened security levels and allows you to customize your data access management plan based on individual user levels.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-right:10%;--awb-padding-bottom:40px;--awb-padding-left:10%;--awb-bg-image:url(&#039;https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/08\/Security-Cloud-1950x1200_239330065.jpg&#039;);--awb-bg-position:center center;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-empty-column-bg-image fusion-column-has-bg-image\" data-bg-url=\"https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/08\/Security-Cloud-1950x1200_239330065.jpg\"><img decoding=\"async\" class=\"fusion-empty-dims-img-placeholder fusion-no-large-visibility\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container fusion-parallax-fixed hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:75px;--awb-padding-right:10%;--awb-padding-bottom:75px;--awb-padding-left:10%;--awb-background-color:rgba(0,0,0,0);--awb-background-image:url(&quot;https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/08\/Security-WhitePaper-2000x1126_245877131.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;background-attachment:fixed;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-color:rgba(89,0,186,0);--awb-bg-color-hover:rgba(89,0,186,0);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:35px;--awb-padding-right:10%;--awb-padding-bottom:35px;--awb-padding-left:50px;--awb-bg-color:rgba(255,255,255,0.95);--awb-bg-color-hover:rgba(255,255,255,0.95);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h3 style=\"text-align: right;\">IP Whitelisting<\/h3>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-end;margin-left:auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#0060ae;border-color:#0060ae;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-8\"><p>Lock down access to your BEAM data based on specific IP address whitelisting. Protect against unauthorized access by restricting access to your data to only users that are physically located on your office networks. Create custom options for remote users or senior management.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"width:calc( 100% + 0px ) !important;max-width:calc( 100% + 0px ) !important;margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-right:10%;--awb-padding-bottom:40px;--awb-padding-left:10%;--awb-bg-image:url(&#039;https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/11\/Security-Encryption-1950x1200_267969101.jpg&#039;);--awb-bg-position:center center;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-empty-column-bg-image fusion-column-has-bg-image\" data-bg-url=\"https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/11\/Security-Encryption-1950x1200_267969101.jpg\"><img decoding=\"async\" class=\"fusion-empty-dims-img-placeholder fusion-no-large-visibility\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:75px;--awb-padding-right:10%;--awb-padding-bottom:75px;--awb-padding-left:10%;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInRight\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\"><h3 style=\"text-align: right;\">Azure Whitepaper<\/h3>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-end;margin-left:auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#0060ae;border-color:#0060ae;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-10\"><p>Microsoft Azure Cloud hosting meets the strictest data security requirements. The Microsoft data facilities have achieved compliance with stringent standards including FedRAMP, HIPPA, PCI DSS, and SOC2 among others. Learn more in the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/?&amp;ef_id=EAIaIQobChMIgOHRyve65gIVQdyGCh3K5g9dEAAYASAAEgJp-_D_BwE:G:s&amp;OCID=AID2000128_SEM_0SCvwv3Z&amp;MarinID=0SCvwv3Z_287547141280_azure%20security%20center_e_c__50405879030_kwd-296666878016&amp;lnkd=Google_Azure_Brand&amp;gclid=EAIaIQobChMIgOHRyve65gIVQdyGCh3K5g9dEAAYASAAEgJp-_D_BwE\">Azure Security Center<\/a>.<\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--awb-margin-top:0px;\" target=\"_self\" href=\"#\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">DOWNLOAD PAPER<\/span><\/a><\/div><div class=\"fusion-separator\" style=\"align-self: flex-end;margin-left:auto;margin-top:10px;margin-bottom:20px;width:100%;max-width:20%;\"><\/div><div class=\"fusion-text fusion-text-11\"><h3 style=\"text-align: right;\">Data Encryption<\/h3>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-end;margin-left:auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#0060ae;border-color:#0060ae;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-12\"><p>Beam Software helps you protect your data to meet your organizational security and compliance commitments.\u00a0 Encryption transforms data so that only someone with the decryption key can access it.\u00a0 BEAM employs data encryption at rest and disk encryption, as well as transparent data encryption to encrypt your entire SQL database.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-bg-parallax\" data-bg-align=\"right center\" data-direction=\"left\" data-mute=\"false\" data-opacity=\"100\" data-velocity=\"-0.3\" data-mobile-enabled=\"false\" data-break_parents=\"0\" data-bg-image=\"https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/08\/Features-Header-2000x800_246620725.jpg\" data-bg-repeat=\"false\" ><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container fusion-parallax-left nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:right center;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-right:10%;--awb-padding-bottom:50px;--awb-padding-left:10%;--awb-background-color:rgba(124,0,165,0);--awb-background-image:url(&quot;https:\/\/beamsoftware.wpengine.com\/wp-content\/uploads\/2019\/08\/Features-Header-2000x800_246620725.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1100px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:35px;--awb-padding-right:10%;--awb-padding-bottom:35px;--awb-padding-left:10%;--awb-bg-color:rgba(255,255,255,0.81);--awb-bg-color-hover:rgba(255,255,255,0.81);--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInUp\" data-animationDuration=\"0.7\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-13\"><h1 style=\"text-align: center;\">Tour Our Platform<\/h1>\n<\/div><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:20px;margin-bottom:20px;width:100%;max-width:20%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#0060ae;border-color:#0060ae;border-top-width:2px;\"><\/div><\/div><div class=\"fusion-text fusion-text-14\"><h4 style=\"text-align: center;\">Take a customized tour of our platform to learn how BEAM gives you maximum control over your data, providing you a secure and reliable system of record that drives success.<\/h4>\n<\/div><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;max-width:20%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/beamsoftware.wpengine.com\/get-started\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">CALL NOW<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":53,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-67","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beam Software understands the complexities of data security<\/title>\n<meta name=\"description\" content=\"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beamsoftware.com\/software\/security-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beam Software understands the complexities of data security\" \/>\n<meta property=\"og:description\" content=\"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beamsoftware.com\/software\/security-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Beam Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Beam-Software-105794244336539\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-06T18:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beamsoftware.com\/wp-content\/uploads\/2019\/12\/Security-SE-1200x630_271588937.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Beam Software understands the complexities of data security\" \/>\n<meta name=\"twitter:description\" content=\"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/beamsoftware.com\/wp-content\/uploads\/2019\/12\/Security-SEO-1024x512_271588937.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@BeamSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/beamsoftware.com\\\/software\\\/security-and-compliance\\\/\",\"url\":\"https:\\\/\\\/beamsoftware.com\\\/software\\\/security-and-compliance\\\/\",\"name\":\"Beam Software understands the complexities of data security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/beamsoftware.com\\\/#website\"},\"datePublished\":\"2019-07-24T18:35:57+00:00\",\"dateModified\":\"2023-09-06T18:03:10+00:00\",\"description\":\"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/beamsoftware.com\\\/software\\\/security-and-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/beamsoftware.com\\\/software\\\/security-and-compliance\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/beamsoftware.com\\\/software\\\/security-and-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/beamsoftware.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software\",\"item\":\"https:\\\/\\\/beamsoftware.com\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security and Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/beamsoftware.com\\\/#website\",\"url\":\"https:\\\/\\\/beamsoftware.com\\\/\",\"name\":\"Beam Software\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/beamsoftware.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beam Software understands the complexities of data security","description":"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beamsoftware.com\/software\/security-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Beam Software understands the complexities of data security","og_description":"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.","og_url":"https:\/\/beamsoftware.com\/software\/security-and-compliance\/","og_site_name":"Beam Software","article_publisher":"https:\/\/www.facebook.com\/Beam-Software-105794244336539\/","article_modified_time":"2023-09-06T18:03:10+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/beamsoftware.com\/wp-content\/uploads\/2019\/12\/Security-SE-1200x630_271588937.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Beam Software understands the complexities of data security","twitter_description":"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.","twitter_image":"https:\/\/beamsoftware.com\/wp-content\/uploads\/2019\/12\/Security-SEO-1024x512_271588937.jpg","twitter_site":"@BeamSoftware","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/beamsoftware.com\/software\/security-and-compliance\/","url":"https:\/\/beamsoftware.com\/software\/security-and-compliance\/","name":"Beam Software understands the complexities of data security","isPartOf":{"@id":"https:\/\/beamsoftware.com\/#website"},"datePublished":"2019-07-24T18:35:57+00:00","dateModified":"2023-09-06T18:03:10+00:00","description":"Beam Software understands the business-critical complexities of receivables management data security standards and helps you meet the rigid requirements.","breadcrumb":{"@id":"https:\/\/beamsoftware.com\/software\/security-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beamsoftware.com\/software\/security-and-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/beamsoftware.com\/software\/security-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beamsoftware.com\/"},{"@type":"ListItem","position":2,"name":"Software","item":"https:\/\/beamsoftware.com\/software\/"},{"@type":"ListItem","position":3,"name":"Security and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/beamsoftware.com\/#website","url":"https:\/\/beamsoftware.com\/","name":"Beam Software","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beamsoftware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/pages\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":0,"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/pages\/67\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/pages\/53"}],"wp:attachment":[{"href":"https:\/\/beamsoftware.com\/wp-json\/wp\/v2\/media?parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}