One secure place for your data
Dedicated databaseOur hosted solution provides you with one secure place for your data. Each of our customers has their own dedicated database. That minimizes the risk of your data leaking or being impacted by any of our other clients.
Data encryptionWe encrypt your data when it’s at rest and when it’s in transit (on both external and internal connections), preventing data visibility by unauthorized people. Your partnering data belongs to you – and we aim to keep it that way.
Identity & access control management
AuthenticationMake sure that your data is accessed by only the right people. Eliminate unnecessary login headaches by leveraging our Single Sign On capabilities. Not only is it more secure, but your users will thank you – that’s one less password for them to remember.
Access controlControl access rights precisely with our sophisticated access control. By using the role based access control, you can quickly set and update the access rights of entire groups of users. Additionally, you can restrict access to sensitive data or entire folders on a case-by-case basis.
World-class data hosting
We have high expectations for our
cloud solution and so should you.
Our cloud solution is hosted at a
highly-secured datacenter (ISO27001
certified) in Geneva. It features strong
physical access control, 24/7 security
presence and a secured zone
for our solution.
To ensure high availability, we use
virtualization and a synchronized
backup at a datacenter in Paris. If
there’s ever a problem, we can
quickly make a switch and
Storing your data in Europe makes it
that much easier for you to comply
with Europe’s General Data
Protection Regulation (GDPR).
Secure by design, now and in the future
Our solution is built from the ground up to be secure and that’s how we want to stay. Throughout the development process, we apply the principles of Security by Design and Privacy by Design.
We regularly test our development code and cloud platform for common vulnerabilities so we can detect and prevent them before they become problems.
Finally, we monitor the security and performance of our solution nonstop and alert you to any concerns. Security is always on our mind, so you don’t have to worry about it.
Learn more about security at Inova Software
Meet Inova Software's CISO
1) What are you responsible for as the Chief Information Security Officer (CISO) at Inova?
As the CISO, I’m in charge of protecting Inova’s information capital. That includes both our internal information system as well as client data that we process via Inova solutions.
People often make the mistake of thinking that a CISO is only concerned about IT threats, but it’s much bigger than that. Yes, a big part of the job is protecting our data from IT threats such as hackers or viruses, but I also look at security risks coming from corporate business procedures, the building and office space, and even our employees. That’s why, for example, I organize regular employee trainings and send out internal cybersecurity newsletters – to make sure that our team is up-to-date on and aware of the latest threats.
2) Why did the role of CISO at Inova appeal to you?
There are two things I love about being CISO. First, I have a global vision of my company’s security needs and it’s my job to drive the Information Security Roadmap from A to Z. It’s fascinating work that has a big impact on our performance. Second, as CISO I work directly with customers to reassure them and encourage them to trust the cloud. I am a big believer in the opportunities offered by the cloud, but some companies need extra reassurance before they make the leap.
3) What are some of the measures your team undertakes to ensure that Inova’s customers’ data is protected?
I’m a risk manager. If there were no risks, there would be no need to protect data or information. By using a risk-based approach, I can prioritize security measures that will protect the availability, integrity and confidentiality of our customers’ data. Additionally, for Inova to stay state-of-the-art in terms of security and compliance, the solution must evolve continuously. We’re constantly looking for new technological advances and procedures that will maximize our security and keep us ahead of emerging threats.
4) How do you deal with the fact that threats are everywhere and constantly evolving?
I constantly monitor security and privacy news to stay up-to-date on the latest developments and threats. I also make sure that the entire Inova team is aware of what’s going on. Cyberattacks are becoming more sophisticated and increasingly focus on social engineering and human weakness. When each individual team member is alert to new threats and tactics, the entire team is that much stronger and the company is better protected.
5) What are some of the future developments we can look forward to?
All of my projects are in line with the information security system management standard, ISO-27001, which is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. The goal is to be certified as ISO-27001 compliant as soon as possible.