Intent Data Security.

Lock

Our intent data security framework adheres to the highest standards in data compliance, governance, privacy, and confidentiality.

Protected customers are happy customers.

Intent Amplify® Information Security Control Framework

This document outlines the administrative, technical, and physical safeguards (“Controls”) that Intent Amplify® implements to protect customer information. These Controls are subject to periodic updates to reflect changes in Intent Amplify®’s security posture. However, any updates will not reduce the level of security currently provided.

The Controls are designed to protect the confidentiality, integrity, and availability of customer information against potential or existing threats, including unauthorized access, misuse, disclosure, alteration, destruction, and accidental loss or damage. These measures comply with relevant laws applicable to the services provided. Intent Amplify® ensures that its employees and contractors adhere to security policies, standards, and procedures that align with these Controls to safeguard sensitive information.

Information Security Governance

Intent Amplify®’s control environment is shaped by the company’s governance, management, and employee attitudes toward the importance of security controls. This environment starts at the highest level of the company, with executive and senior leadership playing a critical role in defining the organization’s core values, ethical principles, and tone. These foundational elements guide the company’s approach to security and risk management.

At Intent Amplify®, we prioritize the relationships we maintain with our customers and partners, employees, and support staff. With a heightened focus on intent data security, we recognize that an adaptable and agile security program is crucial for protecting business integrity and ensuring the privacy and security of confidential data.

Safeguarding this information is one of our top priorities.

We continually assess and update our security, integrity, availability, and confidentiality controls to stay ahead of emerging threats.

Intent Amplify®’s control environment is shaped by a combination of efforts aimed at developing, enhancing, and ensuring the effectiveness of intent data risk-mitigating controls.

Intent Amplify® has appointed a Data Protection Officer to oversee our Global Intent Data Security and Risk Management program. The Global Intent Data Security and Risk management team collaborates across the company’s business units to provide a comprehensive information security strategy that supports business goals while minimizing the risks and impact of security incidents on both our and our customers’ data.

Security Measures and Auditing

Intent Amplify® employs a multi-layered approach to securing networks, systems, applications, and data. This includes people, processes, and technologies that align with globally recognized security standards. We have established policies, standards, and procedures to validate and enforce these security measures.

Furthermore, an independent auditor conducts a Vulnerability Assessment and Penetration Testing (VAPT) annually, verifying the operational effectiveness of our controls (available under a mutual non-disclosure agreement).

Intent Amplify® is fully committed to ensuring the security, availability, and confidentiality of our products and services. We are certified annually under the ISO 27001 standard.

Intent Amplify® classifies its data into categories including Public, Commercial in Confidence, Internal Use Only, Restricted Confidential, and Restricted Sensitive. This data, which Intent Amplify® acquires, processes, and offers as part of its solutions, is protected through both preventative and detective measures such as encryption and intrusion detection systems.

Access to sensitive data is strictly controlled through physical and logical access controls, ensuring only authorized personnel can view or manage it.

Information Security Governance Framework

The structure of Intent Amplify®’s Global Intent Data Security and Risk Management team is based on key security domains and controls that encompass the following areas:

  • Identity & Access Management
  • Data Security
  • Detection & Response
  • Cloud Security
  • Software, API & Supply Chain Security
  • Network & System Security
  • Infrastructure Vulnerability Management
  • Governance, Risk, and Controls
  • People

At Intent Amplify®, we recognize that security is a shared responsibility across the organization, starting with our employees.

We conduct background checks during the hiring process, provide customized security training to employees, and reinforce best practices with annual security awareness programs.

Policies, Procedures, and Compliance

At the core of Intent Amplify®’s governance are policies, standards, procedures, and guidelines that direct operations across the organization. These documents are regularly reviewed to ensure they align with business objectives and industry best practices.

Our policies are based on global cybersecurity standards, including ISO 27001, and we conduct an annual policy review and re-certification program to ensure they remain effective and relevant.

In addition to these policies, we maintain processes to ensure compliance with applicable laws, contractual obligations, and regulatory requirements. This includes data disposal procedures and secure management of protected data.

Identity & Access Management

Access to Intent Amplify® systems and data is governed by principles including:

  • Need to Know
  • Need to Use
  • Least Privilege
  • Segregation of Duties

We implement strong authentication controls, requiring user IDs and passwords for access, along with multi-factor authentication for remote sessions and administrative access. Privileged access is managed using our Privileged Access Management system, ensuring stringent control over critical systems.

Network Security

Intent Amplify® employs robust network security controls to protect data and systems. These controls include network segmentation, firewalls, security appliances, and strong authentication mechanisms. We monitor network traffic to detect and log any suspicious activity and restrict access between public networks and internal systems.

We also follow a formal change management process for introducing new network devices or components to ensure they meet security requirements. Our network security also extends to wireless and remote access, which is rigorously controlled.

Data Security

Intent Amplify® is committed to securing customer data throughout its lifecycle—whether in transit or at rest. We implement encryption and key management best practices to protect data and ensure compliance with privacy regulations. Continuous monitoring of data access, along with machine learning-based anomaly detection, strengthens our data security framework.

System Security

We protect all devices, including servers, workstations, and mobile devices, through full disk encryption and anti-malware software. We perform regular security reviews and use logging and monitoring to ensure compliance with security policies. Removable media use is restricted, and configuration standards are regularly reviewed for compliance with industry best practices.

Software Security

Intent Amplify® takes a holistic approach to application security, focusing on secure coding, strong authentication, data encryption, and input validation. Regular security testing is conducted to identify vulnerabilities, which are promptly patched. We implement strict API security standards and ensure software supply chain security by vetting third-party libraries and mitigating risks throughout the software lifecycle.

Detection & Response

Intent Amplify® is proactive in investigating incidents related to security, availability, confidentiality, and privacy. Our Global Intent Data Security and Risk Management policy ensures that any breach is managed promptly and in compliance with applicable laws. We use advanced monitoring tools to detect and investigate security events and take corrective actions as necessary.

Our Global Intent Data Security and Risk Management team collaborate with threat hunters across departments to track emerging threats, identify malicious cyber actors, and fortify our defenses. We assume a proactive stance in threat hunting, using in-depth knowledge of adversary tactics to uncover risks that may have evaded current security systems.

Cloud Security

We follow a “secure by design and secure by default” approach to our product innovation and cloud security activities, ensuring all aspects of our cloud infrastructure are configured to the highest security standards. This strategy reduces the risk of vulnerabilities and guarantees the protection of client data.

We continuously improve our product development and cloud security framework, staying ahead of emerging threats and adapting swiftly to changes in the landscape.

Validation & Testing

Our Global Intent Data Security and Risk Management team actively identifies and monitors vulnerabilities through scanning, penetration tests, and third-party reports. We assign severity ratings to all identified threats and prioritize remediation efforts based on these ratings.

Awareness & Training

Intent Amplify® maintains a robust Intent Data Security Awareness program for employees and contractors, covering topics like phishing awareness and emerging threats. All employees are required to complete annual training on security best practices, privacy, ethics, and compliance. We also conduct regular phishing simulations to reinforce awareness and ensure employees understand their role in maintaining a secure workplace.

Operational Measures and Third-Party Management

Intent Amplify® adheres to a global third-party compliance framework, ensuring that all vendors and business partners meet our security standards.

Our third-party risk management program covers selection, onboarding, monitoring, and the termination of third-party relationships, with a strong emphasis on security and compliance.

Business Continuity & Disaster Recovery

Intent Amplify® has established business continuity and disaster recovery plans to ensure the organization can respond to natural, manmade and combination disasters. Our strategies are based on industry standards, including those from the Disaster Recovery Institute International and the Business Continuity Institute.

Physical & Environmental Security

We maintain strict physical security controls to prevent unauthorized access to data centers and sensitive locations. These controls include surveillance cameras, limited access points, and monitoring of access by authorized personnel only.

Artificial Intelligence Security

Intent Amplify is an AI-first organization. Security is a key pillar of our responsible AI program.

We ensure that our AI systems are secure, resilient, and trustworthy, following best practices to protect data and maintain the integrity of AI processes.

This comprehensive approach ensures that Intent Amplify® remains at the forefront of cybersecurity, offering our clients secure, reliable, and compliant services.

Ready to build your data compliant sales pipeline?