Cutting-Edge Technology

Technology drives the success of the LEAP Practice Management Software.

The Benefits of Cloud Technology

Highly Secure Data Storage

Your data is securely stored in a world-class data centre - the same as the big banks. Your data is protected by security and encryption protocols to guard against interception.

Secure Backups and Upgrades

Your data is automatically backed up without you having to worry, eliminating disruption to your firm or any extra IT maintenance costs.

No Need to Host Your Own Server

By eliminating the need for a server in your office, you not only simplify your IT requirements but save money on support costs.

Complete Mobility

Real-time data is accessed from the cloud, so you can work from anywhere via your laptop, LEAP Mobile on your smartphone or the new LEAP iPad app.

Data Security

LEAP’s cloud infrastructure is maintained by Amazon Web Services (AWS) in multiple unmarked facilities within the Sydney region. AWS is a leader in providing cloud computing for some of the world’s most security-sensitive businesses. You have peace of mind that your data is safe with AWS.

The terms of agreement between LEAP and AWS can be found on the AWS website. AWS has achieved a substantial certification and compliance in industry standards which recognise best practices in Information Security. For a full listing of AWS certification and compliance, visit aws.amazon.com/compliance.

Download our data security frequently asked questions.

AWS Advanced Technology Partner

Security Controls

LEAP utilises multiple layers of security controls (software, physical & process based) to protect our client data. This includes but is not limited to:

  • Local and Network Firewalls
  • Multivendor Anti-Virus
  • Access Control Lists
  • Identity and Access Management
  • Symmetric & Asymmetric Encryption systems
  • Secure Code reviews
  • Vulnerability Assessment
  • Externally commissioned audits
  • Web Application Firewalls
  • Application White Listing
  • Security Patch Management
  • Remote Monitoring and Alerting
  • Two Factor Authentication
  • Separation of Duties
  • Anomaly Detection
  • Intrusion Detection & Prevention Systems
  • DDoS Throttling Services
  • ITIL Framework (release/incident/change)
  • Centralised Log Management
  • Two Factor Authentication
  • Data Loss Prevention
  • Externally commissioned penetration testing

System Requirements & System Audit

LEAP is designed to work without a server, on Windows-based workstations or tablets in simple home or office networks. We recommend completing a System Audit to compare the results with LEAP's System Requirements to ensure that your computer is compatible.