Security

DOWNLOAD PRODUCT INFO
Ignite Procurement | Security

Keep your data safe with us

Ignite Procurement - Security - General security information

General information

Data and information security is our top priority! We continuously strive to enhance information security by safeguarding the infrastructure and product, maintaining operational security, securing and improving software development, and performing threat-mitigation activities and external penetration tests. Protecting and ensuring the confidentiality, availability, and integrity of your data is crucial to our business.

Ignite Procurement - Security - User permissions

User permissions

Server and data permissions are managed through IAM (Identity and Access Management) solutions to ensure that only the appropriate users can access the different data objects throughout the spend management solution.

Ignite Procurement - Security - Encryption

Encryption

The cloud storage databases manage server-side encryption keys, where data is encrypted using best practice encryption algorithms. For all communication services, both server-to-client and server-to-server, TLS (Transport Layer Security) are enforced with encryption certificates.

Ignite Procurement - Security - Hosting and server information

Hosting and server information

All your data is processed by secure and reliable cloud providers.

Seeing is believing

REQUEST A DEMO