Internet Explorer is not supported
Sorry, please use another browser such as Google Chrome or MozillaFirefox

Safeguards for 3Shape Lab Management Software (LMS)

11 February 2025 | Updated 11.2.2025

3Shape has implemented a range of best practice processes and industry-standard safeguards to protect personal data in its products and services. The security measures for 3Shape Lab Management Software (LMS) are divided into two categories: organizational and technical. Detailed information on these safeguards is provided below:

Technical security measures

Access controls

3Shape enforces strict access controls across its services. LMS users authenticate through 3Shape Account, which manages authentication methods and strength via its Single Sign-On system. Lab administrators can control access to specific LMS features for individual users, ensuring secure and role-based management of permissions.

 
 

Data Encryption & Data Loss

3Shape prioritizes data security and always encrypts data in transit to protect confidentiality and integrity. The LMS is a web-based platform that runs in a browser, with all data transmission secured through HTTPS encryption. This ensures that information remains protected and unreadable to unauthorized parties, even if intercepted.

 
 

Logging and Auditing

3Shape ensures transparency and security through comprehensive logging and auditing. The LMS maintains an event log that records significant changes, creating a detailed audit trail. This enables monitoring of system activities, supports compliance requirements, and helps detect any unauthorized modifications.

 
 

Intrusion Detection and Prevention 

3Shape implements robust security measures to protect against potential threats. Various logging and alerting systems are in place to detect and respond to intrusion attempts in real time. Additionally, strict access controls serve as the primary method of intrusion prevention, ensuring that only authorized users can access LMS resources.

 
 

Firewalls

3Shape employs multiple layers of security to protect LMS data and infrastructure, including network protections such as firewalls, which help prevent unauthorized access and safeguard against potential threats.

 
 

Secure Coding Practices

3Shape follows strict secure coding practices to ensure the security and reliability of LMS. Every code update undergoes a thorough peer review by another developer to identify and mitigate potential security risks before testing and release. This process helps maintain high security standards and software integrity.

 
 

Backup and Recovery

3Shape ensures data protection through continuous and automated backups of all data stored in the LMS. These backups support data integrity, enable recovery in case of unexpected incidents, and help maintain business continuity.

 
 

Network Segmentation

3Shape enhances security through network segmentation, ensuring that LMS cloud services communicate within isolated virtual private networks. These networks are separated from the internet and other 3Shape cloud services, reducing exposure to external threats and enhancing data protection.

 
 

Vulnerability Management

The LMS undergoes regular vulnerability assessments, including both internal and external penetration testing. These ongoing evaluations help identify and address potential security risks, ensuring the system remains resilient against threats.

 
 

Cloud Security Controls

3Shape implements strict cloud security controls to protect LMS resources and data. Access is limited to authorized 3Shape personnel who require it for maintaining and improving the services, ensuring a secure and controlled environment.

 
 

Organizational security measures

3Shape's organizational security measures 

3Shape has implemented a range of best practice processes and industry-standard s

[insert-question 2597998]

 
Was this article helpful?