Security at Gstocky

At Gstocky, we prioritize the security of your data above all else. We have implemented robust security measures to ensure your business information remains safe, private, and accessible only to you.

Highly Secure Infrastructure

Your documents and data are hosted on Google Cloud, one of the most secure cloud infrastructures in the world. This ensures industry-leading reliability, uptime, and protection against physical and digital threats.

Zero Access Policy

We maintain a strict Zero Access policy. This means that only users who own the account have access to their data. Our internal teams do not have access to your private business documents or customer data. You retain full ownership and control.

Two-Factor Authentication (2FA)

We add extra layers of security to your account with Two-Factor Authentication (2FA). This feature ensures that even if someone guesses your password, they cannot access your account without the second form of verification, keeping your account secure against unauthorized access.

Data Encryption

All data transmitted between your device and our servers is encrypted using industry-standard SSL/TLS protocols. Your data is also encrypted at rest, providing an additional layer of security.

πŸ”’ 100% Offline ERP Option

For businesses that require complete data sovereignty and offline operation, we offer a 100% Offline ERP solution. This option allows you to run Gstocky entirely on your own infrastructure without any internet dependency.

  • βœ“ Complete offline functionality - no internet required
  • βœ“ Your data stays on your servers only
  • βœ“ Built-in backup and restore capabilities
  • βœ“ One-time payment - no recurring fees
  • βœ“ Full control over your business data

Contact us to learn more about our offline ERP solution and pricing.