We take security seriously here at Inpart. We use a risk-based approach to ensurea high level of Availability, Confidentiality and Integrity for our customers' data.
Security at Inpart
Secure by design, now and in the future
Security by Design is a concept in cybersecurity that pushes companies to develop their software or hardware around a foundationally secure design. It is a proactive approach that aims to prevent potential cyberattacks rather than addressing issues later as they arise.
According to the influential AppSec Framework, Security by Design should be based on three pillars:
Defining and sharing the process by formalizing a secure software development lifecycle policy.
Identifying and training security champions who will be the eyes of the security at all steps of the DevOps process
Integrating security tools into the DevOps pipeline to automate vulnerability detection.
Prevent threats before they can emerge
It's always preferable to create security architectures that prevent cyberattacks from occurring in the first place than address the impact of a realized threat after the fact. The Security by Design approach means minimizing the initial attack surface and acting proactively with every new layer of security.
Establish trust and inspire customer confidence
Placing security at the center of a software product delivers a confidence boost for customers who adopt it and establishes trust in the software and its capabilities as the organization takes on more challenging and innovative projects.
Let's talk concretely
One central place for your data
Our hosted solution provides you with one secure place for your data. Each of our customers has their own dedicated database. That minimizes the risk of your data leaking or being impacted by any of our other customers.
We encrypt your data when it's at rest and when it's in transit (on both external and internal connections), preventing data visibility by unauthorized people. Your partnering data belongs to you — and we aim to keep it that way.
Identity & access control management
Make sure that your data is accessed by only the right people. Eliminate unnecessary login headaches by leveraging our Single Sign On capabilities. Not only is it more secure, but your users will thank you — that's one less password for them to remember.
Control access rights precisely with our sophisticated access control. By using the role based access control, you can quickly set and update the access rights of entire groups of users. Additionally, you can restrict access to sensitive data or entire folders on a case-by-case basis.
World-class data hosting
We have high expectations for our cloud solution and so should you. Our cloud solution is hosted at a highly-secured datacenter (ISO27001 certified) in Geneva. It features strong physical access control, 24/7 security presence and a secured zone for our solution.
To ensure high availability, we use virtualization and a synchronized backup at a datacenter in Paris. If there's ever a problem, we can quickly make a switch and restore service.
Storing your data in Europe makes it that much easier for you to comply with Europe's General Data Protection Regulation (GDPR)
Monitor, detect, prevent
We regularly test our development code and cloud platform forcommon vulnerabilities so we can detect and prevent thembefore they become problems.
Finally, we monitor the security and performance of our solutionnonstop and alert you to any concerns. Security is always onour mind, so you don't have to worry about it.