# How does UiPath meet the data and access security requirements of modern enterprises?

Security

##### Post Metadata
- Posted at: about 8 years ago
- Net upvotes: 2


## Comments
### Comment 1

User access control is role-base with customized password complexity. Access is appropriate for work requirements and controlled by role and responsibility differentiations. Also, customers can customize the complexity of passwords across the role-based categories.
 
Robot credentials are 256-bit encrypted &amp; stored in either MS Credentials Manager or CyberArk’s Identify Manager. Because robots mimic the UI actions of human employees, they need the same credentials as those employees to access systems and applications. The UiPath Platform provides customers with two options for the secure storage of robot credentials - both of which include 256-bit encryption of the credentials themselves: stored on-premises in a SQL database using Microsoft’s Credentials Manager, or stored off-premises in a CyberArk database using CyberArk’s Identify Manager.
 
Network security is based on TLS 1.2 w/256-bit AES encryption. Authentication headers meet IPSec standards. Our Enterprise Platform can’t function without network communication: for example, Studio uploads automations into a secured repository; Orchestrator then retrieves and assigns those automations to various robots. Accordingly, the network transport layers for this communication must be secure. We use TLS (which stands for ‘transport layer security’) 1.2 with 256-bit AES encryption. This meets the highest standards for network security.
 
Product &amp; 3rd party code are Veracode tested for flaws and security vulnerabilities. UiPath uses Veracode for regular testing of our platform code and also all natively integrated third-party code. Veracode is a cloud-based security analysis service, used by a large number of global financial institutions, that performs a series of security checks on cloud, enterprise and mobile applications. These checks are designed to find vulnerabilities to breaches or hacking.
 
Version control is provided natively by either TFS (MS Team Foundation Server) or SVN (Apache Subversion). The purpose of version control is to make sure individual developers and teams track code changes over time. Accurate code tracking supports productive team collaboration which, in turn, results in quicker development times.


##### Comment Metadata
- Posted at: about 8 years ago
- Author title: Mina Deckard




## Related Product
[UiPath Agentic Automation](https://www.g2.com/products/uipath-agentic-automation/reviews)

## Related Category
[Robotic Process Automation (RPA)](https://www.g2.com/categories/robotic-process-automation-rpa)

## Related discussions
- [How well does Trello scale into a larger team?](https://www.g2.com/discussions/1-how-well-does-trello-scale-into-a-larger-team)
  - Posted at: almost 13 years ago
  - Comments: 6
- [Can we please add a new section](https://www.g2.com/discussions/2-can-we-please-add-a-new-section)
  - Posted at: almost 13 years ago
  - Comments: 0
- [Quantifiable benefits from implementing your CRM](https://www.g2.com/discussions/quantifiable-benefits-from-implementing-your-crm)
  - Posted at: almost 13 years ago
  - Comments: 4


