Inovatec Trust Centre
We protect data across our products with encryption in transit and follow extensive practices to monitor and safeguard our customer' s information through a comprehensive control fra mework. Customer trust is at the centre of what we do and why security is our top priority. Security is pivotal when we are designing our products a nd the sup porting architecture. Inovatec's security architecture is designed to balance the need for flexibility and effective controls to ensure the utmost protection of your information.
There’s a difference between saying you provide secure services and proving that you provide secure services. We’ve proved it through completing annual SOC 1 Type II and SOC 2 Type II audits. The completion of these audits is an independent, third-party validation that our security meets and exceeds industry standards.
The successful completion of our SOC 1/2 Type II examination audits provides our clients with the assurance that the controls and safeguards we employ to protect and secure their data are in line with industry standards and best practices.
Our Trusted Business Partners
Performing activities that are core to business operations and strategy in the cloud requires more transparency and trust into service provider operations and processes. By leveraging Microsoft and Salesforce infrastructure and data centres we' ve partnered with the world's most trusted cloud providers to ensure the utmost protection of our customer's data.
Inovatec Systems Corp is committed to protecting confidential customer information. Therefore, we have implemented an information security management system (ISMS) according to ISO / IEC 27001 with extensive measures to protect the confidentiality, integrity, and availability of valuable customer and company data. We have passed the audit assessment of the information security requirements as specified by the German Association of the Automotive Industry (VDA). The assessment was conducted by TUV Rheinland and results can be obtained via TISAX®.
We perform on-going application and network security scans to identify and resolve software weaknesses and software bugs on our computers and products. We also work closely with trusted security firms to evaluate on an annual basis our practices against industry standards.