In2linx was built to support millions of users and deliver high performance, reliability and robust data protection. It was designed with security in mind by an experienced team of software builders. The In2linx application has built-in security functionality that every customer benefits from. And operationally, we have a strict set of policies in place to ensure customer data is kept safe. These policies include but are not limited to restricting employee access to customer data.
All customer communications are over secure HTTP access (HTTPS) so that you can establish secure communication sessions with your In2linx account using TLS.
All account data that is not moving through the network is encrypted while “at rest” in the database. We encrypt all data using 256-bit AES encryption.
All user activity in In2linx is logged in the activity stream which can then be filtered and searched against.
In2linx automatically scans all uploaded files for viruses. This helps protect against malicious files from being uploaded and shared with other users in the account. If In2linx detects a virus in a file, we reject the upload and notify the user.
In2linx protects its system infrastructure by using dedicated firewall to block unauthorized system access. Operating system installations are patched based on vendor recommendations and hardened by removing unnecessary processes and open ports.
In2linx provides each customer has their own secure tennant.
Tight system access security is enforced and no In2linx employees are able to access customer data unless specifically required to do so for support reasons. Then only specially designated senior technical employees have the necessary access permissions. Any systems access is logged and tracked for auditing purposes.
In2linx has been carefully designed to separate customer data and to prevent even inadvertent disclosure of data from one user to another. User account permissions and roles are enforced at the server and database level to prevent malicious users from escalating their privileges. We carefully design all new features to prevent potential attacks such as SQL injection and cross-site-scripting.
In2linx employs security tools that safeguard all our servers and information systems including data stored in these systems.
Application and infrastructure penetration testing are performed regularly.