Intellifold Security

Product security, our processes and controls, and compliance

Introduction

Intellifold is committed to delivering a secure, reliable, and high-performing service to its clients. Our objectives are based on service commitments made to our customers, compliance with applicable laws and regulations, and adherence to internal policy and operational requirements.

Product Security

Our Process Mining & AI’s infrastructure includes the cloud hosted networking, compute and database components of Microsoft Azure.

System
Type
Description
Azure Virtual Machines
Cloud Compute
Service to run virtual machines
PostgreSQL
Data Storage
Open-source relational database management system emphasizing extensibility and SQL compliance
Azure Front Door
Networking
Cloud content delivery network (CDN) service


Primary software used for support the Intellifold Process Mining & AI platform includes:

Software
Purpose
Intellifold platform
Software as a Service System provided toIntellifold Process Mining & AI customers
Azure Security Services
Cloud security posture management (CSPM) and cloud workload protection (CWP) that finds weak spots across cloud configurations
Azure Active Directory
Authentication software used to identify and authenticate users for access control to the systems
Bitbucket
Source code repository used to manage the software code and version control
JIRA
Ticketing software used to log request and issues for software updates
Google Workspace
Suite of enterprise productivity, collaboration, and communication tools
Vanta
Compliance platform with automated security & compliance monitoring


Our Security Commitments include:


Our Availability Commitments include:

Data Protection

Intellifold views its information and information systems as essential and fundamental to our business operations. We allocate resources to enhance information security practices across Intellifold. We manage risks to our information systems and protect any information or data from unauthorised access, loss, or misuse. To manage risks, Intellifold employs a range of access controls, security devices, and monitoring tools to scrutinise Intellifold information systems and security practices.

At Intellifold we handle confidential and personal data daily. This includes, but is not limited to, user information, supplier, customer, or product data, financial information, client and login credentials, or information collected from potential clients and third parties. Data Protection Principles and Data Security Measures apply to Personal data, Confidential data, and Sensitive data.

Intellifold adheres to the following data protection principles:

Data Security

We aim to maintain the highest levels of security across all servers, laptops, and software products. Appropriate security measures include antivirus software, hard drive encryption, security updates and patches, firewalls, access controls, event monitoring, network service security, access timeouts, password management, and other relevant security protocols. We regularly review and enhance these security measures to align with current technologies and industry-standard practices. We implement the following security measures to protect client, third-party, and internal data:

Compliance & Monitoring

We are very proud to have our processes SOC2 certified in 2025. See Vanta's Trust Center to see implemented controls and test results.

Also, for our providers we verify compliance with ISO27001 and SOC2 standards. Intellifold complies with all applicable data protection laws, and regular monitoring and reviews are conducted to ensure ongoing compliance. This includes:


We are excited to announce that we have successfully completed the SOC 2 Type 1 examination. This milestone underscores our commitment to maintaining the highest standards of security and operational excellence.

  • The criteria for a description of a service organisation’s system in DC section 200, 2018 Description Criteria for a Description of a Service Organisation’s System in a SOC 2® Report (AICPA, Description Criteria) with regards to the Description.
  • The trust services criteria relevant to Common Criteria/Security, Availability, Confidentiality(applicable trust services criteria) set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Criteria).