Reminders

Intranet security | Igloo Software

Security


Your data is safe with us.

Igloo works inside and outside your firewall, so whether you’re using Igloo exclusively as an intranet, or you’ve extended permissions to clients and partners outside your company, your data remains secure. It’s hosted in a private cloud and content is delivered securely via the web browser.

Igloo’s enterprise-class security features are constantly monitored and tested. Our platform, processes, and networks regularly undergo independent security audits to ensure our high standards for security are met – and exceeded.

security igloo product

Identity and access management

Our access, authentication, and identity services ensure only authorized users enter your Igloo. 

With Igloo, user authentication is simple. We support both Igloo’s native sign-in, and single sign-on (SSO) with SAML, so no additional login is required for access. And, Igloo never stores passwords in a readable format – credentials are always stored as a secure, salted hash.

Data loss and prevention

Your data belongs to you and we go to great lengths to protect it.

Igloo servers are hosted at SSAE 16 (SOC 1, SOC 2 Type II) and ISO 27001 compliant facilities. Our hosting environment encrypts your data using AES-256 and AES-256 FIPS 140-2 Level 3 to keep your data safe at rest. Plus, all connections to Igloo are secured via SSL/TLS, so you’re covered from every angle (Qualys SSL Labs even gives us an A+).

Igloo is SOC 2 Type II compliant as well, and subject to extensive and continuous third-party network vulnerability scans, intrusion detection monitoring, and penetration tests. Your data is mirrored locally within the data center and backed up regularly. Igloo also replicates to a disaster recovery location to ensure continuity and redundancy. And, we perform regular reviews to test for vulnerabilities inside the application.

AICPA logo
ISO 27001 logo
Sky high logo

Corporate governance

Igloo is designed to make your life easier. As an IT admin, you have complete control of the content, applications, and structure of your community. You can set up restrictions system-wide, or control access by group, individual, and even by specific pieces of content. And, permissions cascade down so you don’t have to duplicate work with each new member.

Plus, if IT resources are tight, you can choose to delegate control over many elements of the platform, including content and membership management, and webmaster tasks. It’s easy to do, thanks to the drag-and-drop interface, and IT retains overall control, so there’s no permission issues or duplication.


Viewed 6,222 times