Probate Finder OnDemand is just so easy and everything happens so quickly that it doesn't take a lot of brain power to
operate.probate finder on demand testimonial

Billing Manager, Southwest Oncology Group

ISO 27001

Forte ISO 27001 certificate

Security is our top priority

At Forte, we take security seriously. Your sensitive account data is protected by our world-class Information Security Program that is HIPAA compliant and certified to the ISO 27001 international standard. With Probate Finder OnDemand™, you can share, manage and access your information with confidence.

ISO 27001

Information Security Program certified to the ISO 27001 standard, the only internationally recognized standard.

probate finder ondemand role access

Role Based Access

Role-based settings and user privileges tightly control access privileges such as editing, viewing and adding accounts.

probate finder ondemand SSL

SSL Encryption

Session content secured with 168-bit encryption using Secure Socket Layer (SSL) to protect data during transit.

probate finder ondemand firewall

Network Security

Security infrastructure continuously monitored and tested by internal staff and third-party auditors.

probate finder ondemand internal audit

Internal Audits

Frequent internal reviews of user and system transactions including file uploads, field edits and workflow updates.

probate finder ondemand risk assessment

Risk Assessment

Proactive risk monitoring, assessment and continuous improvement of our ISO 27001 information security program.

Security Architecture

probate finder ondemand security architecture

Comprehensive security at every level

By incorporating key security features and making them easy to administer and use, Probate Finder OnDemand enables an effective and safe online user experience. This includes:

  • Preventing unauthorized use of the system
  • Avoiding any compromise of assets, including data, software and private networks
  • Protecting the privacy and integrity of confidential information
  • Ensuring the availability and reliability of service
  • Integrating seamlessly with other network/computer security measures

Application Level Protection

  • 10-character password requirement including letters, numbers, symbols and caps
  • Text image verification during registration, log in and password reset
  • Unique, randomly generated temporary password applied to password reset
  • Temporary user lock-out for too many failed log-in attempts or session time-out
  • Compliant with HIPAA/HITECH, GLBA and state data-privacy laws

Network Level Protection

  • External penetration testing to validate system security
  • Sophisticated dual-firewall design to selectively control access
  • Intrusion detection system to continuously monitor network traffic
  • Multiple servers and backup systems to create a seamless flow of data

Physical Level Protection

  • Physical access to servers is tightly restricted and continuously monitored
  • All web, application and database servers are housed in secure co-location data centers
  • Data centers implement ongoing audit, 24/7/365 monitoring and surveillance
  • Power systems feature multiple power feeds, UPS devices and backup