Modern Networks Need Comprehensive Security & Compliance
Security is key to enabling automation for all. Itential’s commitment to confidentiality, integrity, and availability is one of the reasons why Itential is the leader in network and cloud automation.
- Comprehensive Security Operations
Itential’s information security team approaches security holistically based on industry best practices. Security threats are prevented using detection and prevention systems, secure software development practices, and industry-leading operational practices. We perform rigorous security testing including threat-modeling, automated scanning, and third-party audits. - Industry-Standard Security Compliance
Itential’s cloud-native application has achieved SOC 2 Type 2 compliance. Additionally, we are committed to the principles inherent in privacy legislation like GDPR and CCPA. Please contact Itential at compliance@itential.com for copies of reports as applicable to your organization. - Step-by-Step Processing Integrity
Built to automate any network domain and any network change, Itential’s network automation platform ensures the integrity of your data at every step of your automation. By leveraging sophisticated cloud security technologies, our product is secure and resilient, giving you the confidence to enable automation across your enterprise.
Vulnerability Reporting
Itential is committed to the security of our customers and their data. We encourage customers to report vulnerabilities in our products to and welcome your contributions via our Responsible Disclosure Policy. When reporting a potential vulnerability, please include a detailed summary of the vulnerability and the tools used during discovery. If you are a customer and have a password or account issue, please contact Itential support.