Security Overview - InvolveSoft

Security Overview

InvolveSoft manages events including sourcing, registration, and invitations, as well as post-event tracking and reporting, including hours contributed, pictures uploaded, and employee ratings and comments. With InvolveSoft you can also communicate with your entire workforce through an Instagram like interface and collect AI-driven intelligence from sales & customer conversations. Rigorous infrastructure and administrative procedures protect all customer information stored by InvolveSoft. We maintain a highly secure environment that meets the physical and data protection requirements demanded by today’s businesses.

Your trust is our most important asset.

Policies and Procedures
InvolveSoft policies, procedures, and training address data privacy, security, and regulations including employee background checks, handling of confidential information and data retention. We require all our third-party technology partners to meet the same level of data privacy and security requirements.
Risk Management and Mitigation
InvolveSoft monitors for potential incidents related to security and/or privacy. Events are reported through a tracking system and trigger internal alerts, data collection, isolation, correction, and prevention measures. We will notify a customer’s security team about any specific incident.
Vulnerability and Penetration Testing
InvolveSoft follows secure coding practices consistent with the Open Web Application Security Project (OWASP) and utilizes peer review throughout the development process.
Business Continuity and Disaster Recovery
InvolveSoft technology resources are designed to withstand disruptions in normal operations. All internal systems are cloud-based, enabling execution from multiple locations in the event of a disaster. All customer-provided services are managed in various zones, eliminating single points of failure.

Security Features

Physical Security
InvolveSoft uses data centers that are secure, guarded, and monitored 24/7 with video surveillance and intrusion detection systems. Authorized staff must utilize multi-factor authentication to access any data center. All physical access to data centers by AWS employees is logged and audited.
Certifications
Third-party organizations and companies have certified AWS by with numerous laws and compliance regulations including ISO, SOC, and GDPR.
Encryption
All content is stored on Amazon’s Simple Storage Service (S3) and is encrypted at rest. All traffic between the application and the client is encrypted in transmission using HTTPS with industry-standard transport layer security (TLS) technology.
Backups
Systems are backed up regularly with backups stored off-site. If any data is lost or becomes temporarily unavailable, it can be restored from the latest backup. Backups are stored on the Amazon S3 service with high availability and reliability, persisting the data across multiple availability zones.

InvolveSoft is Built for the Enterprise

Single Sign-On
We enable enterprises to manage users from a single, central directory.
Product Assortment
We offer different versions of a product to meet the needs of enterprise customers.
Audit Logs
We provide admins with a detailed trail of account activity.
Role Based Access Control
We allow for the separation of privileges by user role.
Change Management
We empower admins with tools and collateral to roll out features and product changes.
Product Security
We have strong application security through best practices.
Deployment Options
We balance data security concerns and application overhead with flexible deployment options.
Team Management
We enable collaboration with coworkers in an account that is centrally managed.
Integrations
We create data portability by allowing customers to pull data out and push data into your application.
Reporting & Analytics
Reports allow admins to demonstrate value gained from the use of an application.
SLA and Support
We have a dedicated customer success & support team for our enterprise clients.
GDPR
We can enable European Union's General Data Protection Regulation.

Compliance certifications and regulations

FedRAMP
(Li-Saas) Federal Risk and Authorization Management Program
ISO/IEC 27001
Information Security Management System (ISMS)
NIST 800-171
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
ISO/IEC 27017
Security Controls for the Provision and Use of Cloud Services
SOC 2
(Type III) Trust Services Principles
ISO/IEC 27018
Protection of Personally Identifiable Information (PII)
SOC 3
Service Organizations Controls
HIPAA
Health Insurance Portability and Accountability Act
EU/US Privacy Shield
Swiss/US Privacy Shield
Data Privacy Practices
CSA
Cloud Security Alliance

Trusted by great companies

Do you have any security issues or questions?

Contact Us

""