XILO's Security

Data security is critical to everything we do at XILO
Certified
In Progress

SOC 2

Service Organization Controls (Soc2) (Type II) Trust Services Principles
SOC 2

Security Features

Data and privacy

Product security

Internal security procedures

Organizational security

Password and Credential Storage

Intercom enforces a password complexity standard and credentials are stored using a PBKDF function (bcrypt).

Auditor

Prescient Assurance
Phone Number
1 646-209-7319
Address

1100 Market Street Suite 600 Chattanooga, TN 37402

Certified
In Progress

GDPR

General Data Protection Regulation
 GDPR

Security Features

SSO & 2FA

SAML Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials. If you’re using password-based authentication, you can turn on 2-factor authentication (2FA).

Permissions

We enable permission levels within the app to be set for your teammates. Permissions can be set to include app settings, billing, user data or the ability to send or edit messages.

Data and privacy

Auditor

Prescient Assurance
Phone Number
1 646-209-7319
Address

1100 Market Street Suite 600 Chattanooga, TN 37402

Complete
In Progress
check markIn progress icon
Customer data deleted upon leaving
Complete
In Progress
check markIn progress icon
Data retention procedures established
Complete
In Progress
check markIn progress icon
Data classification policy established
Complete
In Progress
check markIn progress icon
Vulnerabilities scanned and remediated
Complete
In Progress
check markIn progress icon
Vendor management program established
Complete
In Progress
check markIn progress icon
Service description communicated
Complete
In Progress
check markIn progress icon
Third-party agreements established
Complete
In Progress
check markIn progress icon
Risk management program established
Complete
In Progress
check markIn progress icon
Risks assessments performed
Complete
In Progress
check markIn progress icon
Risk assessment objectives specified
Complete
In Progress
check markIn progress icon
External support resources available
Complete
In Progress
check markIn progress icon
Company commitments externally communicated
Complete
In Progress
check markIn progress icon
Data center access reviewed
Complete
In Progress
check markIn progress icon
Physical access processes established
Complete
In Progress
check markIn progress icon
Incident management procedures followed
Complete
In Progress
check markIn progress icon
Incident response policies established
Complete
In Progress
check markIn progress icon
Access requests required
Complete
In Progress
check markIn progress icon
System changes communicated
Complete
In Progress
check markIn progress icon
Incident response plan tested
Complete
In Progress
check markIn progress icon
Support system available
Complete
In Progress
check markIn progress icon
Security policies established and reviewed
Complete
In Progress
check markIn progress icon
Board meetings conducted
Complete
In Progress
check markIn progress icon
Roles and responsibilities specified
Complete
In Progress
check markIn progress icon
Organization structure documented
Complete
In Progress
check markIn progress icon
Management roles and responsibilities defined
Complete
In Progress
check markIn progress icon
System changes externally communicated
Complete
In Progress
check markIn progress icon
Backup processes established
Complete
In Progress
check markIn progress icon
Board expertise developed
Complete
In Progress
check markIn progress icon
Board charter documented
Complete
In Progress
check markIn progress icon
SOC 2 - System Description
Complete
In Progress
check markIn progress icon
Board oversight briefings conducted
Complete
In Progress
check markIn progress icon
Whistleblower policy established
Complete
In Progress
check markIn progress icon
Development lifecycle established
Complete
In Progress
check markIn progress icon
Production deployment access restricted
Complete
In Progress
check markIn progress icon
Change management procedures enforced
Complete
In Progress
check markIn progress icon
Cybersecurity insurance maintained
Complete
In Progress
check markIn progress icon
Configuration management system established
Complete
In Progress
check markIn progress icon
Continuity and disaster recovery plans tested
Complete
In Progress
check markIn progress icon
Control self-assessments conducted
Complete
In Progress
check markIn progress icon
Penetration testing performed
Complete
In Progress
check markIn progress icon
Data transmission encrypted
Complete
In Progress
check markIn progress icon
Continuity and Disaster Recovery plans established
Complete
In Progress
check markIn progress icon
Data encryption utilized
Complete
In Progress
check markIn progress icon
Vulnerability and system monitoring procedures established
Complete
In Progress
check markIn progress icon
Security awareness training implemented
Complete
In Progress
check markIn progress icon
Visitor procedures enforced
Complete
In Progress
check markIn progress icon
MDM system utilized
Complete
In Progress
check markIn progress icon
Confidentiality Agreement acknowledged by employees
Complete
In Progress
check markIn progress icon
Code of Conduct acknowledged by employees and enforced
Complete
In Progress
check markIn progress icon
Password policy enforced
Complete
In Progress
check markIn progress icon
Confidentiality Agreement acknowledged by contractors
Complete
In Progress
check markIn progress icon
Performance evaluations conducted
Complete
In Progress
check markIn progress icon
Asset disposal procedures utilized
Complete
In Progress
check markIn progress icon
Production inventory maintained
Complete
In Progress
check markIn progress icon
Code of Conduct acknowledged by contractors
Complete
In Progress
check markIn progress icon
Employee background checks performed
Complete
In Progress
check markIn progress icon
Portable media encrypted
Complete
In Progress
check markIn progress icon
Anti-malware technology utilized
Complete
In Progress
check markIn progress icon
Production OS access restricted
Complete
In Progress
check markIn progress icon
Service infrastructure maintained
Complete
In Progress
check markIn progress icon
Network and system hardening standards maintained
Complete
In Progress
check markIn progress icon
Network firewalls utilized
Complete
In Progress
check markIn progress icon
Network firewalls reviewed
Complete
In Progress
check markIn progress icon
Network segmentation implemented
Complete
In Progress
check markIn progress icon
Log management utilized
Complete
In Progress
check markIn progress icon
Infrastructure performance monitored
Complete
In Progress
check markIn progress icon
Remote access encrypted enforced
Complete
In Progress
check markIn progress icon
Remote access MFA enforced
Complete
In Progress
check markIn progress icon
Intrusion detection system utilized
Complete
In Progress
check markIn progress icon
Unique network system authentication enforced
Complete
In Progress
check markIn progress icon
Access revoked upon termination
Complete
In Progress
check markIn progress icon
Production database access restricted
Complete
In Progress
check markIn progress icon
Production network access restricted
Complete
In Progress
check markIn progress icon
Firewall access restricted
Complete
In Progress
check markIn progress icon
Access control procedures established
Complete
In Progress
check markIn progress icon
Production application access restricted
Complete
In Progress
check markIn progress icon
Unique account authentication enforced
Complete
In Progress
check markIn progress icon
Encryption key access restricted
Complete
In Progress
check markIn progress icon
Unique production database authentication enforced
Complete
In Progress
check markIn progress icon
Development lifecycle established
Complete
In Progress
check markIn progress icon
Continuity and disaster recovery plans tested
Complete
In Progress
check markIn progress icon
Role-Based Access Control
Complete
In Progress
check markIn progress icon
Audit Logging
Complete
In Progress
check markIn progress icon
Customer data deleted upon leaving
Complete
In Progress
check markIn progress icon
Data retention procedures established
Complete
In Progress
check markIn progress icon
Data classification policy established
Complete
In Progress
check markIn progress icon
Vulnerabilities scanned and remediated
Complete
In Progress
check markIn progress icon
Vendor management program established
Complete
In Progress
check markIn progress icon
Service description communicated
Complete
In Progress
check markIn progress icon
Third-party agreements established
Complete
In Progress
check markIn progress icon
Risk management program established
Complete
In Progress
check markIn progress icon
Risks assessments performed
Complete
In Progress
check markIn progress icon
Risk assessment objectives specified
Complete
In Progress
check markIn progress icon
External support resources available
Complete
In Progress
check markIn progress icon
Company commitments externally communicated
Complete
In Progress
check markIn progress icon
Data center access reviewed
Complete
In Progress
check markIn progress icon
Physical access processes established
Complete
In Progress
check markIn progress icon
Incident management procedures followed
Complete
In Progress
check markIn progress icon
Incident response policies established
Complete
In Progress
check markIn progress icon
Access requests required
Complete
In Progress
check markIn progress icon
System changes communicated
Complete
In Progress
check markIn progress icon
Incident response plan tested
Complete
In Progress
check markIn progress icon
Support system available
Complete
In Progress
check markIn progress icon
Security policies established and reviewed
Complete
In Progress
check markIn progress icon
Board meetings conducted
Complete
In Progress
check markIn progress icon
Roles and responsibilities specified
Complete
In Progress
check markIn progress icon
Organization structure documented
Complete
In Progress
check markIn progress icon
Management roles and responsibilities defined
Complete
In Progress
check markIn progress icon
System changes externally communicated
Complete
In Progress
check markIn progress icon
Backup processes established
Complete
In Progress
check markIn progress icon
Board expertise developed
Complete
In Progress
check markIn progress icon
Board charter documented
Complete
In Progress
check markIn progress icon
SOC 2 - System Description
Complete
In Progress
check markIn progress icon
Board oversight briefings conducted
Complete
In Progress
check markIn progress icon
Whistleblower policy established
Complete
In Progress
check markIn progress icon
Development lifecycle established
Complete
In Progress
check markIn progress icon
Production deployment access restricted
Complete
In Progress
check markIn progress icon
Change management procedures enforced
Complete
In Progress
check markIn progress icon
Cybersecurity insurance maintained
Complete
In Progress
check markIn progress icon
Configuration management system established
Complete
In Progress
check markIn progress icon
Continuity and disaster recovery plans tested
Complete
In Progress
check markIn progress icon
Control self-assessments conducted
Complete
In Progress
check markIn progress icon
Penetration testing performed
Complete
In Progress
check markIn progress icon
Data transmission encrypted
Complete
In Progress
check markIn progress icon
Continuity and Disaster Recovery plans established
Complete
In Progress
check markIn progress icon
Data encryption utilized
Complete
In Progress
check markIn progress icon
Vulnerability and system monitoring procedures established
Complete
In Progress
check markIn progress icon
Security awareness training implemented
Complete
In Progress
check markIn progress icon
Visitor procedures enforced
Complete
In Progress
check markIn progress icon
MDM system utilized
Complete
In Progress
check markIn progress icon
Confidentiality Agreement acknowledged by employees
Complete
In Progress
check markIn progress icon
Code of Conduct acknowledged by employees and enforced
Complete
In Progress
check markIn progress icon
Password policy enforced
Complete
In Progress
check markIn progress icon
Confidentiality Agreement acknowledged by contractors
Complete
In Progress
check markIn progress icon
Performance evaluations conducted
Complete
In Progress
check markIn progress icon
Asset disposal procedures utilized
Complete
In Progress
check markIn progress icon
Production inventory maintained
Complete
In Progress
check markIn progress icon
Code of Conduct acknowledged by contractors
Complete
In Progress
check markIn progress icon
Employee background checks performed
Complete
In Progress
check markIn progress icon
Portable media encrypted
Complete
In Progress
check markIn progress icon
Anti-malware technology utilized
Complete
In Progress
check markIn progress icon
Production OS access restricted
Complete
In Progress
check markIn progress icon
Service infrastructure maintained
Complete
In Progress
check markIn progress icon
Network and system hardening standards maintained
Complete
In Progress
check markIn progress icon
Network firewalls utilized
Complete
In Progress
check markIn progress icon
Network firewalls reviewed
Complete
In Progress
check markIn progress icon
Network segmentation implemented
Complete
In Progress
check markIn progress icon
Log management utilized
Complete
In Progress
check markIn progress icon
Infrastructure performance monitored
Complete
In Progress
check markIn progress icon
Remote access encrypted enforced
Complete
In Progress
check markIn progress icon
Remote access MFA enforced
Complete
In Progress
check markIn progress icon
Intrusion detection system utilized
Complete
In Progress
check markIn progress icon
Unique network system authentication enforced
Complete
In Progress
check markIn progress icon
Access revoked upon termination
Complete
In Progress
check markIn progress icon
Production database access restricted
Complete
In Progress
check markIn progress icon
Production network access restricted
Complete
In Progress
check markIn progress icon
Firewall access restricted
Complete
In Progress
check markIn progress icon
Access control procedures established
Complete
In Progress
check markIn progress icon
Production application access restricted
Complete
In Progress
check markIn progress icon
Unique account authentication enforced
Complete
In Progress
check markIn progress icon
Encryption key access restricted
Complete
In Progress
check markIn progress icon
Unique production database authentication enforced
Complete
In Progress
check markIn progress icon
Development lifecycle established
Complete
In Progress
check markIn progress icon
Continuity and disaster recovery plans tested
Complete
In Progress
check markIn progress icon
Role-Based Access Control
Complete
In Progress
check markIn progress icon
Audit Logging
Contact Our Security Team