Enterprise-Grade Security for Your Schedules

Your resource and project data, and financial details stay encrypted, compliant, and completely under your control.

Badge 1 Badge 2 Badge 3

Our Security Philosophy

At eResource Scheduler, we know that scheduling resources on projects also means managing

trust. That’s why data security isn’t a department; it’s a design philosophy woven into our architecture, our culture, and our code.

Our users deserve clarity, not fine print, so our security practices are transparent, audited, and

always improving.

Data Encryption

Your data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption standards. Sensitive details like login credentials and tokens are hashed using Scrypt and salted, ensuring nothing readable leaves our servers.

Access Control Icon

Access Control

Granular role-based access control (RBAC) lets you define who can view, edit, or allocate resources. Combine that with multi-level permissions and custom user roles, and you get airtight visibility without accidental overreach.

Identity & Authentication

Multi-factor authentication (MFA) and secure single sign-on (SSO) options protect your account access. Session management and IP-based restrictions keep unauthorized logins at bay.

GDPR Compliant

eResource Scheduler meets GDPR requirements. Independent reviews validate privacy, access, and data-handling policies, giving assurance that personal information remains fully protected.

SOC 2 Type II Certified

eResource Scheduler is SOC 2 Type II certified. Customer data and access controls are protected through third-party audits aligned with the industry gold standard.

ISO 27001 Certified

eResource Scheduler is ISO 27001 certified. Governance, risk management, and security practices are reviewed and audited regularly to ensure strong, consistent controls.

Application & Infrastructure Security

Hosted on Google Cloud Platform (GCP) with email servers on AWS, both enterprise-grade environments. Continuous monitoring of latency, availability, and system health ensures uptime and performance never miss a beat.

Employee & Vendor Security

All employees undergo background verification, mandatory security training, and least-privilege access enforcement. Third-party integrations and vendors are pre-screened for compliance and required to match our own data-handling standards.

Backups & Recovery

Daily automated backups with 3-point redundancy, encrypted and stored in separate data centers. We routinely test our disaster recovery plan to ensure business continuity even in extreme scenarios.

Vulnerability Management

Regular third-party penetration tests and vulnerability assessments keep eRS ahead of emerging threats. Every finding is logged, remediated, and verified because the best defense is proactive.

Your Data, Your Rights

You own your data, always. We never sell, share, or repurpose customer data. You can request export or deletion anytime, and we honor data retention policies that fit your organization's compliance needs.

Self Hosted. Control First

eResource Scheduler's self-hosted version puts full control in your hands. Manage data and compliance on your own servers while user access stays exactly where it should.

Security isn’t static, and neither are we. As threats evolve, we constantly refine our

infrastructure, update our policies, and strengthen controls. Because your trust deserves our full

attention, 24×7.

Found a potential vulnerability? Report any issue to support@enbraun.com.

Frequently Asked Questions

  • How does eResource Scheduler ensure customer data stays separate and secure?

    Each customer’s data is logically isolated within our database architecture. Access is tightly controlled through authentication layers and role-based permissions, ensuring no cross-account visibility or accidental data exposure.

  • Do you train employees on security and privacy best practices?

    Yes. Every team member completes mandatory onboarding and annual refresher training on data protection, phishing awareness, and secure development. Security awareness isn’t optional but a part of the job description.

  • Does eRS use customer data for analytics or marketing purposes?

    Never. Customer data is used solely to deliver and improve the service you use. We don’t sell, share, or mine user information for advertising or third-party analytics. Your data remains yours, always.

  • What happens to my data if I cancel my account?

    When you close your eRS account, your data is securely archived for a short retention window before being permanently deleted from all live and backup systems, following verified deletion procedures.

  • Where are the eResource Scheduler’s servers physically located?

    All eRS data is hosted on Google Cloud Platform (GCP), using secure data centers with multi-layered physical and digital protections. AWS provides state-of-the-art security certifications and regional hosting options to meet compliance needs.

  • Are your APIs and integrations secure?

    Yes. All APIs use secure token-based authentication. Access scopes are restricted by design, ensuring integrations only perform actions explicitly permitted by you.

  • How does eRS protect against unauthorized access?

    eRS layers multiple defenses to prevent unauthorized access. Multi-factor authentication (MFA), secure single sign-on (SSO), CAPTCHA prompts, and account lockouts safeguard logins. Role-based permissions, IP blacklists, and session timeouts further minimize exposure, while continuous monitoring detects and blocks any suspicious activity in real time.

Plan Smarter. Schedule Faster.

Join thousands already using eResource Scheduler to align teams, time, and tasks seamlessly.

No setup delay | No payment required | Just clarity from day one