Intinno utilizes some of the most advanced technology for Internet security available today. When you access our site, Secure Socket Layer (SSL) technology protects your username and password information using both server authentication and data encryption, ensuring that your data is safe, secure, and available only to registered users in your organization.

Intinno provides each user with a unique user name and password that must be entered each time a User logs on. Intinno issues a session ‘cookie’ only to record encrypted authentication information for the duration of a specific session. The session ‘cookie’ does not include either the username or password of the user.

In addition, Intinno is hosted in a secure server environment that uses full hardware firewalling with packet-inspection, virus guard and other advanced technology to prevent interference or access from outside intruders. Moreover, Intinno’s data centre is held in a dedicated, secure hosting environment at Amazon Data Centers or in local servers as per the additional agreements with the organization. In addition, all data is backed up on a daily rotation to our off-site backup servers.

1. Strong Security & Data Safety
Security is one of our topmost priorities. We have therefore developed a comprehensive set of policies, technologies and practices to make sure your data is secure.

If your data is currently maintained on personal computers or your own servers with no security professional for maintaining back ups, auditing and  safeguarding them with ever increasing threats – it is very likely that we offer better level of securiy than what you currently have.

The various areas of security that are handled by us are explained in the sections below. While we cannot list all details of our infrastructure for security reasons, our customers can be rest assured that the practices, policies and technologies that Intinno has implemented are world class and reliable. For more information about our Security you could email us at info@Intinno.com

2. Physical & Network Security

  • Hardware is located at state-of-the-art Data Centers provided by Amazon. It has been built to the highest global standards to deliver a secure, reliable, and resilient infrastructure for your information.
  • Physical security provided at the Data Center like Biometric Access, Surveillance Cameras, Photo Id card, etc.
  • Network level security consisting of Robust Firewalls, Intrusion Detection Systems and Anti Virus Software.
  • Server and OS Hardening done.

3. Application Security

  • The application has been systematically developed to handle vulnerabilities like SQL Injection, XSS, URL copying, etc.
  • Comprehensive Access level rights ensure that each user can see and use only areas they are allowed to.
  • Separate and distinct domains & sub domains.
  • Routine professional vulnerability scanning is done on the application.

4. Data Security

  • Servers have raid mirrored hard drives that ensure redundancy – one hard drive fails, the other instantly takes over (you won’t even notice).
  • Developers are cut off from accessing live production environment.