Committed to Upholding User Data
Protection
At inai, our customers’ trust is critical to us. Know that your information is in safe hands with inai. We adhere to the highest global standards, implementing a thorough approach to prioritize both data privacy and security.
Inai's Commitment to Security and Compliance
At inai, safeguarding customer data is at the core of what we do every day. We adhere to globally-recognized standards in data handling, follow best practices, and strictly comply with data transfer regulations. Our commitment to compliance is independently assessed by third-party auditors, ensuring that we meet the rigorous standards of GDPR, SCA, ISO 27001 and maintain PCI-DSS compliance.
Protect data with secure hosting
We store all data in localized AWS instances and follow best practices to ensure data is protected. inai maintains fully compliant data centers that ensure sensitive data is stored securely. Additionally, inai encrypts data at rest so our customers can feel safe that their data is secure.
Restrict data access with internal controls
Even more important in today’s remote work environment are limits to accessing customer data. A number of capabilities are available to ensure data is only accessible by authorized users on your team. Security measures inai provides include: two-factor authentication, role-based access, and restricted IP access.
Protection Through Network Firewall
Our network benefits from a robust network-level firewalling system. This system provides a formidable defense against network attacks. We closely monitor and exercise tight control over firewall protections to ensure the security of our network.
Security Measures
To reinforce the security of our network, we rely on essential AWS security services, ongoing audits, and vigilant network IT supervision. These measures allow us to actively monitor and proactively thwart recognized malicious traffic and attacks.
Dedicated Infosec Team
At Inai, we maintain a dedicated information security Team that's available around the clock every day of the year. They are on standby to respond swiftly to security alerts and incidents.
External Penetration Testing
In addition to our comprehensive internal scanning and testing procedures, we regularly engage in third-party assessments and audits conducted multiple times each year. This practice enhances our security posture and validates its effectiveness.