Security and compliance at

Join our clients around the world who trust Intasite to keep their data safe and secure.

Single sign-on (SSO) with Microsoft

Our software offers seamless user access with Single Sign-On (SSO), streamlining login processes and enhancing security across multiple applications.

Penetration testing

Our software undergoes rigorous penetration testing, allowing us to proactively identify and address vulnerabilities and potential cyber threats.

Data centre security

We employ AWS’s top-tier data centre security, utilising advanced technologies and strict measures to safeguard your data with the utmost protection.

Data encryption in transit and at rest

Your information is protected both during transit and when at rest, employing robust encryption protocols to maintain the utmost security.

GDPR compliant

We prioritise the protection of personal data and ensure strict adherence to GDPR to uphold the privacy rights and trust of our valued users.

Granular access rights and privileges

Granular access rights and privileges, allow you to control and manage user permissions to ensure data security and confidentiality are always maintained.

Hosted in the UK

Our services are hosted on UK soil, providing you with a reliable and localised infrastructure to ensure compliance with GDPR data regulations.

Multi factor authentication (MFA)

Our platform supports Multi-Factor Authentication, adding an extra layer of protection to ensure that only authorised users can access your information.

External validation and certifications

In addition, we proudly hold external certifications, assuring our commitment to robust security measures and industry-leading standards.

ISO 9001 & ISO 270001 Certified
ISO 9001 & 27001

We are proud to be ISO 9001 & 27001 UKAS certified, reflecting our commitment to quality management and information security standards.

Cyber Essentials Certified
Cyber Essentials

Our company boasts Cyber Essentials certification, reinforcing our dedication to safeguarding against cyber threats and ensuring robust cybersecurity measures are in place.