We protect data across our products with encryption in transit and follow extensive practices to monitor and safeguard our customer's information through a comprehensive control framework. Customer trust is at the center of what we do and why security is our top priority. Security is pivotal when we are designing our products and the supporting architecture. Inovatec's security architecture is designed to balance the need for flexibility and effective controls to ensure the utmost protection of your information.
We have completed our Service Organization Control (SOC) 2 Type 1 report. The completion of this assessment provides you and your auditors reasonable assurance that Inovatec's information security practices, policies, procedures, and operations meet the SOC 2 standards for security, confidentiality, integrity, and availability.
The successful completion of our SOC2 Type I examination audit provides our clients with the assurance that the controls and safeguards we employ to protect and secure their data are in line with industry standards and best practices.
— Christian Reina, CISSP, CISM, CRISC, CISA, Information Security Officer
Our Trusted Business Partners
Performing activities that are core to business operations and strategy in the cloud requires more transparency and trust into service provider operations and processes. By leveraging Microsoft and Salesforce infrastructure and data centers we've partnered with the world's most trusted cloud providers to ensure the utmost protection of our customer's data.
We perform on-going application and network security scans to identify and resolve software weaknesses and software bugs on our computers and products. We also work closely with trusted security firms to evaluate on an annual basis our practices against industry standards.