Trust & Security
Enterprise-grade security and data protection for your workplace safety needs
Network Security
TrustIn utilizes the scalable infrastructure offered by AWS (Amazon Web Services) which is ISO 27001 certified. Our servers are strategically located in the Asia Pacific (Mumbai) Region to ensure optimal performance and data sovereignty.
To ensure that external parties cannot gain access to your company's sensitive data, we have implemented IP whitelisting to prevent unauthorized access to our server. If any user tries to access our server with an IP address that isn't whitelisted, they will be immediately denied access.
ISO 27001 Certified
AWS Infrastructure
Mumbai Region
Data Sovereignty
Authentication & Authorization
To prevent any security vulnerabilities, TrustIn servers are secured by JWT authorization tokens. We have role-based restricted access to our platform.
This ensures that specific data within your dashboard will be hidden from anyone in your organization who is not authorized to access it, maintaining strict data segregation and privacy.
JWT Tokens
Secure token-based auth
Role-Based Access
Granular permissions
Multi-Factor Auth
Additional security layer
Session Management
Auto-timeout security
Data Protection & Handling
TrustIn supports SSL/TLS encryption on all data transmissions between TrustIn client applications and the TrustIn server across both LAN and the internet, ensuring end-to-end security.
TrustIn provides a variety of security management capabilities and integrates with typical enterprise security infrastructures, such as LDAP, Kerberos, and x509 certificates for the authentication of users, applications, and other nodes within the cluster.
These capabilities may be applied at various levels of granularity, from the entire shared infrastructure to individual clusters, databases, or collections.
SSL/TLS Encryption
All data transmissions
Encrypted Storage
At-rest protection
Data Privacy
To minimize the chances of your information being hacked or stolen, we only store data when absolutely necessary. Conversations with TrustBot remain private until the reporter decides to submit the report they create.
Data Minimization
We only store what's absolutely necessary for providing our services, reducing your exposure to data breaches.
Private by Default
Your data remains private until you choose to share. No surveillance, no tracking, no hidden data collection.
User Control
You have full control over your information with the ability to access, modify, or delete your data at any time.
GDPR-Inspired
Our architecture follows global best practices for data protection, ensuring compliance with international standards.
Certifications & Compliance
Our infrastructure and practices meet the highest industry standards for security and compliance.
ISO 27001
AWS Infrastructure
SOC 2
Type II Compliant
GDPR-Ready
Architecture
India Data
Mumbai Region
Questions about our security practices?
Our team is here to answer any questions about how we protect your data and ensure compliance with industry standards.
Contact Security Team