Trust

Security at Intently

We treat the confidentiality, integrity, and availability of your data as core product requirements — not a checklist.

Encryption

TLS 1.2+ for all data in transit. AES-256 encryption for data at rest in our production databases and object storage.

Access control

Role-based access in the product (Admin, Analyst, Viewer). Least-privilege policies for production access, MFA enforced for Intently staff, and centralized audit logging.

Infrastructure

Hosted on leading cloud providers in SOC 2–oriented regions. Network segmentation, DDoS protection, and regular patching.

Application security

Annual third-party penetration tests, dependency scanning in CI, and responsible disclosure for security researchers (security@getintently.io).

Your data

Customer event data is logically isolated per account. You control retention, export, and deletion from the dashboard.

For questionnaires, SIG Lite, or custom security reviews: security@getintently.io