Data and information security is our top priority! We continuously strive to enhance information security by safeguarding the infrastructure and product, maintaining operational security, securing and improving software development, and performing threat-mitigation activities and external penetration tests. Protecting and ensuring the confidentiality, availability, and integrity of your data is crucial to our business.
Data security is important to us. We want you to feel confident and comfortable while sharing your data. Ignite’s SOC 2 compliance certification is yet another step towards making our security practices match your requirements. Certified by an independent and qualified auditor, this report guarantees our users a high level of security and reliability.
Server and data permissions are managed through IAM (Identity and Access Management) solutions to ensure that only the appropriate users can access the different data objects throughout the spend management solution.
The cloud storage databases manage server-side encryption keys, where data is encrypted using best practice encryption algorithms. For all communication services, both server-to-client and server-to-server, TLS (Transport Layer Security) are enforced with encryption certificates.
All your data is processed by secure and reliable cloud providers.