Security Overview - InvolveSoft

Security Overview

Involve manages events including sourcing, registration, and invitations, as well as post-event tracking and reporting, including hours contributed, pictures uploaded, and employee ratings and comments. With Involve you can also communicate with your entire workforce through an Instagram like interface and collect AI-driven intelligence from sales & customer conversations. Rigorous infrastructure and administrative procedures protect all customer information stored by Involve. We maintain a highly secure environment that meets the physical and data protection requirements demanded by today’s businesses.

Your trust is our most important asset.

Policies and Procedures
Involve policies, procedures, and training address data privacy, security, and regulations including employee background checks, handling of confidential information and data retention. We require all our third-party technology partners to meet the same level of data privacy and security requirements.
Risk Management and Mitigation
Involve monitors for potential incidents related to security and/or privacy. Events are reported through a tracking system and trigger internal alerts, data collection, isolation, correction, and prevention measures. We will notify a customer’s security team about any specific incident.
Vulnerability and Penetration Testing
Involve follows secure coding practices consistent with the Open Web Application Security Project (OWASP) and utilizes peer review throughout the development process.
Business Continuity and Disaster Recovery
Involve technology resources are designed to withstand disruptions in normal operations. All internal systems are cloud-based, enabling execution from multiple locations in the event of a disaster. All customer-provided services are managed in various zones, eliminating single points of failure.

Security Features

Physical Security
Involve uses data centers that are secure, guarded, and monitored 24/7 with video surveillance and intrusion detection systems. Authorized staff must utilize multi-factor authentication to access any data center. All physical access to data centers by AWS employees is logged and audited.
Third-party organizations and companies have certified AWS by with numerous laws and compliance regulations including SOC, and GDPR.
All content is stored on Amazon’s Simple Storage Service (S3) and is encrypted at rest. All traffic between the application and the client is encrypted in transmission using HTTPS with industry-standard transport layer security (TLS) technology.
Systems are backed up regularly with backups stored off-site. If any data is lost or becomes temporarily unavailable, it can be restored from the latest backup. Backups are stored on the Amazon S3 service with high availability and reliability, persisting the data across multiple availability zones.

Involve is Built for the Enterprise

Single Sign-On
We enable enterprises to manage users from a single, central directory.
Product Assortment
We offer different versions of a product to meet the needs of enterprise customers.
Audit Logs
We provide admins with a detailed trail of account activity.
Role Based Access Control
We allow for the separation of privileges by user role.
Change Management
We empower admins with tools and collateral to roll out features and product changes.
Product Security
We have strong application security through best practices.
Deployment Options
We balance data security concerns and application overhead with flexible deployment options.
Team Management
We enable collaboration with coworkers in an account that is centrally managed.
We create data portability by allowing customers to pull data out and push data into your application.
Reporting & Analytics
Reports allow admins to demonstrate value gained from the use of an application.
SLA and Support
We have a dedicated customer success & support team for our enterprise clients.
We can enable European Union's General Data Protection Regulation.

Trusted by great companies

Do you have any security issues or questions?

Contact Us