Data security at IGEN
We recognize that security is critical to you and your success. This is a responsibility we take seriously.
While we cannot reveal every measure we have in place (as this could be used against us by the very actors we protect ourselves against), we can give you a high-level overview of how we actively keep you and your data safe.
SOC 2 Type 2
IGEN is SOC 2 Type 2 certified under all 5 Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. This investment in our information security program further ensures that client data is protected and our systems are secure.
Risk mitigation and compliance tools
Compliance Tracking Tool
We use this compliance platform to maintain our entire information security program. It provides us with continuous visibility of our controls, monitors our compliance, and even provides us with automated evidence collection capabilities.
Endpoint Detection and Response Technology
Monitors, detects, and remediates malicious attempts using machine learning and behavioral analysis.
Vulnerability Management and Web Application Scanning
Provides insight into the security of our applications and any potential vulnerabilities and recommendations for resolution.
Email Protection Gateway
This tool scans incoming and outgoing emails for malware and phishing attacks to protect our systems and contacts from malicious messages.