XILO's Security

Data security is critical to everything we do at XILO
Certified
In Progress

SOC 2

Service Organization Controls (Soc2) (Type II) Trust Services Principles
SOC 2

Security Features

Data and privacy

Product security

Internal security procedures

Complete
In Progress
check markIn progress icon
Vulnerabilities scanned and remediated
Complete
In Progress
check markIn progress icon
Vendor management program established
Complete
In Progress
check markIn progress icon
Service description communicated
Complete
In Progress
check markIn progress icon
Third-party agreements established
Complete
In Progress
check markIn progress icon
Risk management program established
Complete
In Progress
check markIn progress icon
Risks assessments performed
Complete
In Progress
check markIn progress icon
Risk assessment objectives specified
Complete
In Progress
check markIn progress icon
External support resources available
Complete
In Progress
check markIn progress icon
Company commitments externally communicated
Complete
In Progress
check markIn progress icon
Data center access reviewed
Complete
In Progress
check markIn progress icon
Physical access processes established
Complete
In Progress
check markIn progress icon
Incident management procedures followed
Complete
In Progress
check markIn progress icon
Incident response policies established
Complete
In Progress
check markIn progress icon
Access requests required
Complete
In Progress
check markIn progress icon
System changes communicated
Complete
In Progress
check markIn progress icon
Incident response plan tested
Complete
In Progress
check markIn progress icon
Support system available
Complete
In Progress
check markIn progress icon
Security policies established and reviewed
Complete
In Progress
check markIn progress icon
Board meetings conducted
Complete
In Progress
check markIn progress icon
Roles and responsibilities specified
Complete
In Progress
check markIn progress icon
Organization structure documented
Complete
In Progress
check markIn progress icon
Management roles and responsibilities defined
Complete
In Progress
check markIn progress icon
System changes externally communicated
Complete
In Progress
check markIn progress icon
Backup processes established
Complete
In Progress
check markIn progress icon
Board expertise developed
Complete
In Progress
check markIn progress icon
Board charter documented
Complete
In Progress
check markIn progress icon
SOC 2 - System Description
Complete
In Progress
check markIn progress icon
Board oversight briefings conducted
Complete
In Progress
check markIn progress icon
Whistleblower policy established
Complete
In Progress
check markIn progress icon
Development lifecycle established
Complete
In Progress
check markIn progress icon
Production deployment access restricted
Complete
In Progress
check markIn progress icon
Change management procedures enforced
Complete
In Progress
check markIn progress icon
Cybersecurity insurance maintained
Complete
In Progress
check markIn progress icon
Configuration management system established
Complete
In Progress
check markIn progress icon
Continuity and disaster recovery plans tested
Complete
In Progress
check markIn progress icon
Continuity and Disaster Recovery plans established

Organizational security

Password and Credential Storage

Intercom enforces a password complexity standard and credentials are stored using a PBKDF function (bcrypt).
Complete
In Progress
check markIn progress icon
Development lifecycle established
Complete
In Progress
check markIn progress icon
Continuity and disaster recovery plans tested
Complete
In Progress
check markIn progress icon
Audit Logging

Auditor

Prescient Assurance
Phone Number
1 646-209-7319
Address

1100 Market Street Suite 600 Chattanooga, TN 37402

Certified
In Progress

GDPR

General Data Protection Regulation
 GDPR

Security Features

SSO & 2FA

SAML Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials. If you’re using password-based authentication, you can turn on 2-factor authentication (2FA).

Permissions

We enable permission levels within the app to be set for your teammates. Permissions can be set to include app settings, billing, user data or the ability to send or edit messages.

Data and privacy

Auditor

Prescient Assurance
Phone Number
1 646-209-7319
Address

1100 Market Street Suite 600 Chattanooga, TN 37402

Contact Our Security Team