Security by Design
We recognize that your data is very sensitive. We combine enterprise-grade security features with comprehensive audits of our applications, systems, and networks to ensure customer data is always secure and protected.
Our Security Operations
Our security team approaches security holistically based on industry best practices. Security threats are prevented using our detection programs, secure software development practices, and industry-accepted operational practices.
Access, modify, or delete your data at any time. Primary Intelligence will not use your data without your agreement, and when we have your agreement, we use your data to provide only the services you have chosen.
We perform rigorous security testing including regular penetration testing and third-party audits. If an incident occurs, we resolve the issue quickly using our security incident response practices and keep you informed with our real-time system status page.
Data Center & Network Security
Primary Intelligence hosts all its software in the cloud with our cloud provider’s facilities in the USA. Our cloud provider provides an extensive list of compliance and regulatory assurances, including SOC 1/2/3, ISO 27001, ISO 27017, ISO 27018, PCI DSS and CSA STAR.
User Provisioning & Identity Management
Primary Intelligence’s applications provide the ability to connect to your SAML SSO provider and automate user provisioning (SCIM). Single sign-on (SSO) allows you to authenticate users without requiring them to enter login credentials. Primary Intelligence supports SSO using SAML SSO, Okta and Salesforce.
Customizable roles and permissions gives you complete, granular control over who can access what in TruVoice and TruSales, including the ability to restrict the data a user sees in the varous modules within TruVoice and TruSales (e.g. restricting a sales representative to only be able to see feedback data for the accounts and opportunities they own).
With state-of-the-art encryption, Primary Intelligence protects your data both at rest and in transit. Our encryption protocols erect barriers against unauthorized access to the data.
Primary Intelligence maintains security policies that are regularly maintained, communicated, and approved by management to ensure all Primary Intelligence employees clearly know their security responsibilities. Our policies are audited annually as part of our SOC2 certification.