Itential Information Security & Compliance Center

Giving you the confidence to enable secure automation for all.

Modern Networks Need Comprehensive Security & Compliance

Security is key to enabling automation for all. Itential’s commitment to confidentiality, integrity, and availability is one of the reasons why Itential is the leader in network and cloud automation.

  • Comprehensive Security Operations
    Itential’s information security team approaches security holistically based on industry best practices. Security threats are prevented using detection and prevention systems, secure software development practices, and industry-leading operational practices. We perform rigorous security testing including threat-modeling, automated scanning, and third-party audits.
  • Industry-Standard Security Compliance
    Itential’s cloud-native application has achieved SOC 2 Type 2 compliance. Additionally, we are committed to the principles inherent in privacy legislation like GDPR and CCPA. Please contact Itential at compliance@itential.com for copies of reports as applicable to your organization.
  • Step-by-Step Processing Integrity
    Built to automate any network domain and any network change, Itential’s network automation platform ensures the integrity of your data at every step of your automation. By leveraging sophisticated cloud security technologies, our product is secure and resilient, giving you the confidence to enable automation across your enterprise.
bright blue soc2 compliance badge from aicpa for the itential network automation platform, ensuring network security
Security

Vulnerability Reporting

Itential is committed to the security of our customers and their data. We encourage customers to report vulnerabilities in our products to and welcome your contributions via our Responsible Disclosure Policy. When reporting a potential vulnerability, please include a detailed summary of the vulnerability and the tools used during discovery. If you are a customer and have a password or account issue, please contact Itential support.

Frequently Asked Questions

How is data secured?

TLS in transit, strong encryption at rest, customer-controlled keys, and data residency in your environment.

Do you support enterprise identity?

Yes. SAML/OIDC SSO, MFA, and SCIM/Directory sync are supported.

How are secrets handled?

Credentials remain in gateways or enterprise vaults, never exposed in workflows.

How are AI-triggered actions secured?

AI copilots call Itential APIs, which enforce RBAC, approvals, and compliance before executing.

Can AI see sensitive configs?

Only if RBAC allows. Sensitive data can be masked.

Are AI-triggered actions audited?

Yes. Every AI request is logged with attribution, validation, and results.

Does Itential train AI on my data?

No. Itential never shares your configs or telemetry with external AI models.