- Knowledge Base & Help Center
- FAQs
- Security
-
FAQs
-
Troubleshooting & Support
-
Standard Operating Procedures & Policies
- Transaction Categorizations | Basic Services
- Schedule Maintenance with Month End Journal Entry | Basic Services
- Payroll Journal Entries | Basic Services
- Simple Month End Journal Entries | Basic Services
- Bank & Credit Card Reconciliation | Basic Services
- Standard Monthly Report Package
- Month-End Close | Basic Services
- Monthly Close Timing and Required Information
- Autonomous AP Processing | Advanced Services
- Applying Payments to AR Invoices | Advanced Services
- Class & Department or Project/Job Tracking | Advanced Services
- Payroll Categorizations | Advanced Services
- QBO W-9 Form Request | Advanced Services
- 3rd Party Point-of-Sale & Credit Card Merchant | Advanced Services
- Monthly Standard Invoicing | Advanced Services
- Enhanced Ongoing Report Support | Advanced Services
- 3rd Party Inventory Reconciliation | Advanced Services
- Rapid Write Up Procedures
-
BOS Feature User Guide
-
Accounting Partner Resources
-
AI UNCHAINED Conference
-
Strategic Partners
-
Product Updates
Is my financial data safe with Botkeeper?
Rest assured your platform and data are in good hands! The Botkeeper Operating System is protected with the most trusted security protocols in the industry.
Rest assured your platform and data are in good hands! The Botkeeper Operating System is protected with the most trusted security protocols in the industry.
- We’re SOC 2 Type 2 compliant, 256-bit encrypted, and use several other best-in-class security protocols including background checks, biometrics, and extensive permissions).
- And for added security, all systems and databases are located in Amazon Web Services (AWS) data centers within the US. We leverage AWS security products to ensure that our systems and infrastructure are configured in accordance with security and compliance best practices.
- All employees attend annual information security training, and we own our IP. US, plus we own our IP. Our policies and procedures are regulated by US law.
- To enhance login security and safeguard against unauthorized access to our client portals, we’ve also enabled Two-Factor Authentication (2FA) for all users.