Trust Center
Because without it, over 100,000 people would have used a different solution.
Security
Like a watchdog that never sleeps
Work in peace and know that we have your back when it comes to security. Our approach is based on the NIST Cybersecurity Framework (CSF) and we undergo external audits to check that our controls meet SOC 2 Trust Service Principles for security and confidentiality.
Infrastructure
Starting with the foundation
Our infrastructure leverages world-class hosting centers that are trusted by organizations all over the world. It’s a foundation we put in place to stay up-to-date and support you using industry standards.
Application
How we build what we build
We don’t just build software. We continuously try to break it in pursuit of a stronger application for you to use. Our build processes include A LOT of testing, like automated security regression, application penetration testing, and environment vulnerability testing using current threat databases.
Application
How we build what we build
We don’t just build software. We continuously try to break it in pursuit of a stronger application for you to use. Our build processes include A LOT of testing, like automated security regression, application penetration testing, and environment vulnerability testing using current threat databases.
Encryption
Encoding your digital data
With iorad, all the data communications involving the application are encrypted. This requires and enables the latest industry-standard cryptographic protocols (TLS 1.2 and 1.3). Ever see the movie The Matrix? Yea, it’s kind of like that.
Access Management
Sign-in and Roles
We offer SAML single sign-on (SSO) or standard passwords that use salted hash, so nobody, including us, can read them. Once you’re in, iorad lets you control different levels of access within the application based on the account and plan type you’re using. This access can range from view only, to editing and full account administration.
Privacy
International regulation and GDPR
We’re committed to protecting your data and privacy. That’s why we design our practices to comply with international privacy regulations, including General Data Protection Regulation (GDPR). But that’s just the tip of the iceberg, to learn more, be sure to read through our Privacy Policy.
Built-in Tools for Sensitive Information
More ways we help you stay safe
When you use iorad to create a tutorial, none of the keystrokes that occur within the recording frame are logged during capture. We don’t store any of that information. We also built in a masking tool that lets you permanently blur any sensitive information that shows up in the screenshots of your tutorial.
Accessibility
For anyone and everyone
Our roots run deep when it comes to eLearning. That’s what helped us get our start and it’s what we remain committed to providing for people of all abilities. Learn more about how iorad approaches accessibility for all here.