In2linx was built to support millions of users and deliver high performance, reliability and robust data protection. It was designed with security in mind by an experienced team of software builders. The In2linx application has built-in security functionality that every customer benefits from. And operationally, we have a strict set of policies in place to ensure customer data is kept safe. These policies include but are not limited to restricting employee access to customer data.
Secure network access
All customer communications are over secure HTTP access (HTTPS) so that you can establish secure communication sessions with your In2linx account using TLS.
Encryption of data at rest
All account data that is not moving through the network is encrypted while “at rest” in the database. We encrypt all data using 256-bit AES encryption.
Activity stream
All user activity in In2linx is logged in the activity stream which can then be filtered and searched against.
Anti-virus scanning
In2linx automatically scans all uploaded files for viruses. This helps protect against malicious files from being uploaded and shared with other users in the account. If In2linx detects a virus in a file, we reject the upload and notify the user.
System and operational security
In2linx protects its system infrastructure by using dedicated firewall to block unauthorized system access. Operating system installations are patched based on vendor recommendations and hardened by removing unnecessary processes and open ports.
Individual Customer Tennant
In2linx provides each customer has their own secure tennant.
Employee data access
Tight system access security is enforced and no In2linx employees are able to access customer data unless specifically required to do so for support reasons. Then only specially designated senior technical employees have the necessary access permissions. Any systems access is logged and tracked for auditing purposes.
Software security
In2linx has been carefully designed to separate customer data and to prevent even inadvertent disclosure of data from one user to another. User account permissions and roles are enforced at the server and database level to prevent malicious users from escalating their privileges. We carefully design all new features to prevent potential attacks such as SQL injection and cross-site-scripting.
Security Tools
In2linx employs security tools that safeguard all our servers and information systems including data stored in these systems.
Security Testing
Application and infrastructure penetration testing are performed regularly.