Trust & Security

Enterprise-grade security and data protection for your workplace safety needs

Network Security Infrastructure
Infrastructure Security

Network Security

TrustIn utilizes the scalable infrastructure offered by AWS (Amazon Web Services) which is ISO 27001 certified. Our servers are strategically located in the Asia Pacific (Mumbai) Region to ensure optimal performance and data sovereignty.

To ensure that external parties cannot gain access to your company's sensitive data, we have implemented IP whitelisting to prevent unauthorized access to our server. If any user tries to access our server with an IP address that isn't whitelisted, they will be immediately denied access.

ISO 27001 Certified

AWS Infrastructure

Mumbai Region

Data Sovereignty

Access Control

Authentication & Authorization

To prevent any security vulnerabilities, TrustIn servers are secured by JWT authorization tokens. We have role-based restricted access to our platform.

This ensures that specific data within your dashboard will be hidden from anyone in your organization who is not authorized to access it, maintaining strict data segregation and privacy.

JWT Tokens

Secure token-based auth

Role-Based Access

Granular permissions

Multi-Factor Auth

Additional security layer

Session Management

Auto-timeout security

Authentication and Authorization System
Data Protection and Encryption
Data Encryption

Data Protection & Handling

TrustIn supports SSL/TLS encryption on all data transmissions between TrustIn client applications and the TrustIn server across both LAN and the internet, ensuring end-to-end security.

TrustIn provides a variety of security management capabilities and integrates with typical enterprise security infrastructures, such as LDAP, Kerberos, and x509 certificates for the authentication of users, applications, and other nodes within the cluster.

These capabilities may be applied at various levels of granularity, from the entire shared infrastructure to individual clusters, databases, or collections.

SSL/TLS Encryption

All data transmissions

Encrypted Storage

At-rest protection

Privacy First

Data Privacy

To minimize the chances of your information being hacked or stolen, we only store data when absolutely necessary. Conversations with TrustBot remain private until the reporter decides to submit the report they create.

Data Minimization

We only store what's absolutely necessary for providing our services, reducing your exposure to data breaches.

Private by Default

Your data remains private until you choose to share. No surveillance, no tracking, no hidden data collection.

User Control

You have full control over your information with the ability to access, modify, or delete your data at any time.

GDPR-Inspired

Our architecture follows global best practices for data protection, ensuring compliance with international standards.

Industry Standards

Certifications & Compliance

Our infrastructure and practices meet the highest industry standards for security and compliance.

ISO 27001

AWS Infrastructure

SOC 2

Type II Compliant

GDPR-Ready

Architecture

India Data

Mumbai Region

Questions about our security practices?

Our team is here to answer any questions about how we protect your data and ensure compliance with industry standards.

Contact Security Team