Ignite Procurement | Security

Keep your data safe with us

Ignite Procurement - Security - General security information

General information

Data and information security is our top priority! We continuously strive to enhance information security by safeguarding the infrastructure and product, maintaining operational security, securing and improving software development, and performing threat-mitigation activities and external penetration tests. Protecting and ensuring the confidentiality, availability, and integrity of your data is crucial to our business.

SOC2 compliance

Data security is important to us. We want you to feel confident and comfortable while sharing your data. Ignite’s SOC 2 compliance certification is yet another step towards making our security practices match your requirements. Certified by an independent and qualified auditor, this report guarantees our users a high level of security and reliability.

Ignite Procurement - Security - User permissions

User permissions

Server and data permissions are managed through IAM (Identity and Access Management) solutions to ensure that only the appropriate users can access the different data objects throughout the spend management solution.

Ignite Procurement - Security - Encryption


The cloud storage databases manage server-side encryption keys, where data is encrypted using best practice encryption algorithms. For all communication services, both server-to-client and server-to-server, TLS (Transport Layer Security) are enforced with encryption certificates.

Ignite Procurement - Security - Hosting and server information

Hosting and server information

All your data is processed by secure and reliable cloud providers.

Seeing is believing