iconNew AnnouncementClick Here

Protection without compromise.

At Indigenius, we understand how important security is to you. That’s why we’ve built a robust, multi-layered security framework to protect your data.

Platform Preview

Compliance

We protect your data, and never use it for model trainings without your agreements.

Compliance
Compliance
Compliance
Compliance
Compliance

Our Philosophy

Our security program is multi-faceted and covers compliance, application security, and infrastructure security, fully complying with SSAE18 SOC2 controls covering Confidentiality, Availability, and Security.

Compliance

Data Protection

We follow industry standard best practices around data security, compliance, and privacy.

Compliance

Proactive Defense

Indigenous evolving practices and annual audits validate your data's safety and compliance.

Compliance

Artificial Intelligence (AI)

Your data remains private. Our AI sub-processors are barred from using customer data for training.

Top-Tier Standards for Data Protection

icon

SAML SSO 2.0

Providing secure, seamless single sign-on access. Read more about it here.

icon

SCIM Provisioning

Automated, secure identity management across applications via SCIM provisioning.

icon

Audit Logs

Keeping comprehensive logs for transparency and accountability.

icon

Analytics

Delivering data insights with strong security controls.

icon

Protected Sharing

Ensuring only authorized users access your content.

icon

Roles-Based Permission

Enterprise customers can customize access to protect sensitive information.

icon

PCI-DSS Compliant

Meeting Payment Card Industry Data Security Standards by utilizing Stripe.

icon

SOC Compliance

SOC compliance verifies the effectiveness of a company's data security controls over time.

icon

App Penetration Testing

Indigenius hires specializes in web application security to test our platform regularly.

sheild

Encryption

We use robust encryption protocols to protect your sensitive data, ensuring your content remains private and secure at all times. For encryption at rest, AES-256 is utilized. AES-256 is a strong encryption standard that uses a 256-bit key to securely encrypt and decrypt data, providing robust protection against unauthorized access. For encryption in transit, HTTPS 1.3 and 1.2 are supported.

Proactive Data Defense

Our security practices continuously evolve to counter new threats. We stay ahead of risks through proactive monitoring and regular updates.

icon

Annual Audit

We undergo regular third-party audits to verify our security measures.

icon

Incident Response Planning

We undergo incident response exercises to test our defensive security processes.

icon

Business and Disaster Recovery

We're prepared for the unexpected to ensure continuity.

icon

Cyber Insurance

Providing an extra layer of protection for our users.

icon

Data Deletion on Request

Respecting your privacy and complying with (data subject access right) deletion requests.

icon

Penetration Testing

Conducting annual tests to find and fix vulnerabilities.

icon

Sub-processors List Available

Being transparent about our partners and their roles.

icon

Data Processing Agreement

Committing to data protection through enforceable agreements.

icon

Centralized IAM Solution

Efficiently managing employee access to sensitive information.

Artificial
intelligence (AI)

Indigenius uses AI to enhance the core product experience, delivering significant value to our users in their everyday work. We prioritize security, reliability, and user-centric design to ensure a safe and dependable experience.

Generative AI Platforms

Indigenius AI features are powered by business-tier APIs from various top AI platforms. We are committed to notifying our customers if there are any changes in how we process, store, or transmit your data. This is part of our regular SOC2 Type 2 assessment and is validated by our auditors.

Data Processing AI

Content added directly in the Indigenius platform (e.g. image uploads, text copy/pasting, document embedding, chart creation) is not processed by the generative AI backends. Generative AI integrations can be disabled for your company's account upon request.

Data Usage for Training Models

Data processed by our AI models will not be used to train public LLM models. These business-grade APIs come with guarantees:

  • Data will not train public LLMs.
  • Data will be retained for a maximum of 30 days to mitigate against abuse.

Data Security with AI

Indigenius utilizes TLS 1.2/1.3 over HTTPS to transmit data securely between our platform and 3rd party generative AI platforms. These are considered the strongest protocols available today.