Influitive Security Features
Influitive is trusted by both SMBs and some of the world’s largest software companies to protect their customer’s privacy and their company’s integrity. We maintain the proper certificates and perform comprehensive audits to ensure enterprise-grade security. Our proactive approach means that our applications, systems, and networks offer top-level security and that access to our policies, certificates, audits, and other critical documents are readily available.
Security Best Practices
We take a proactive approach to security. Our Security Policy document covers all of our practices in detail. We maintain a Security Package that includes our Security Policy and all of our audits, reports, and other security and privacy-related assets. This is available for our customers and companies seeking to work with us. Our team is committed to a quick turnaround for security questionnaires.
Security Certifications and Auditing
Influitive’s security team leverages industry best practices to secure the confidentiality and integrity of your data. We used the SOC 2 auditing process to ensure that our operational and security processes are consistent with the highest industry standards. We utilize both internal tools and third-party experts for vulnerability scans and detailed annual penetration testing.
Data and Privacy
Our applications maintain the following Laws and Standards related to information security and web standards: GDPR, CCPA, PEPEDA, EU Privacy Shield and CASL. Enjoy the flexibility of managing your own consent requirements, terms and conditions, and privacy policy (or leveraging our templates).
Data Center
We use AWS cloud hosting, ensuring the highest standards to protect the integrity and confidentiality of your data. Our data center is located in the USA. For more information about AWS security protocols click here.
Secure Development Lifecycle
The application is built on a Polyglot platform utilizing a mix of Ruby, Node, Java, and Go platforms, distributed across multiple microservices running within Docker containers. We use an agile management method to manage the development lifecycle. Our process includes discovery, design, development, risk assessment, log monitoring, application security review, and infrastructure architecture review.