
Security
and Compliance
Security By Design
Security By Design
Multi-tiered data security model

Multi-tiered data security model

Multi-tiered data security model

End-to-end security in product lifecycle
End-to-end security in product lifecycle
End-to-end security in product lifecycle
Highly resilient architecture
Highly resilient architecture
Highly resilient architecture
Application Security
Application Security
Get quick access with SAML single sign on
Get quick access with SAML single sign on
Get quick access with SAML single sign on
Two-factor authenticationesilient architecture
Two-factor authenticationesilient architecture
Two-factor authenticationesilient architecture
Control user access and permissions

Control user access and permissions

Control user access and permissions

System Security
System Security
All data encrypted in transit (TLS 1.2) and at rest (AES-256-GCM)

All data encrypted in transit (TLS 1.2) and at rest (AES-256-GCM)

All data encrypted in transit (TLS 1.2) and at rest (AES-256-GCM)

Infrastructure is hosted in AWS
Infrastructure is hosted in AWS
Infrastructure is hosted in AWS
Application logs record user access to customer data
Application logs record user access to customer data
Application logs record user access to customer data
©Identifee Inc.
©Identifee Inc.