Security and Risk

Security
  1. Table of Content

Serious about your security? We are too!

Our responsibility to protect the data of our customers is a heavy one, and we take it seriously. When you entrust your data to Ignite, you can be assured of our commitment to safeguarding your information and meeting the highest levels of security.

Our Security and Risk documentation provides high-level principles and concepts related to data and information security in Ignite Procurement (the “Company”) including the spend management solution (the “Platform” or "Service"). You may access and read the Security and Risk documentation here.

SOC2 report (Type 1)

System and Organization Controls (SOC) 2 reports are independent third-party examination reports that demonstrate how an organization achieves key compliance controls and objectives. The purpose of the SOC 2 report is to evaluate an organization’s information systems relevant to security, availability, processing integrity, confidentiality, and privacy. 

You can feel confident that your data with us is secure and confidential. Our SOC 2 compliance certification guarantees this, and we go the extra mile to show that you can trust us. You may access and download our SOC 2 report here.