Overview
The introNetwork System is a three-tier architecture which includes the client (written in Flex), the middle layer written in .NET and the third tier, the SQL database. Every system is hosted by Rackspace, a company well known for its extraordinary security precautions. Using an array of load-balanced web servers, each isolated to its specific task, we assure that all data is isolated, secure and protected.
Control of Information
The data within an introNetwork system originates in its most secure form when it is populated using our Single Sign On web service. This allows for an encrypted pre-population of information from your database to user records in the introNetwork system. This is typically limited to contact information and never includes financial information. Each client makes a determination as to which data is pulled into or pushed from the introNetwork system. In many cases, the Phone Number and Email address are hidden so that other users cannot see them. You can also choose to hide other fields, such as Company or Title or whichever fields suit your Privacy needs. Even when you are more open about showing this information and choose to leave these fields viewable, individual users can then choose to simply not fill those fields out, or remove them entirely if that person is concerned about his or her information being seen.
Login and Password Requirements
When the Single Sign On web service is employed, authentication of the individual user is done on the client side. The user logs into an intranet or secure portal and once authenticated on the client side, and only then, they can launch the introNetwork and enter the community. This is the most secure method of login control. Each introNetworks system uses email addresses as the unique identifier. This combination of user name, email address and password ensures that each user record is unique.
Physical Security
The introNetworks servers are co-located at Rackspace in San Antonio, Texas where they manage three critical security areas: physical security, operational security, and system security. Physical security includes locking down and logging all physical access to servers at the data center. Operational security involves creating business processes that follow security best practices to limit access to confidential information and maintain tight security over time. System security involves locking down systems from the inside, starting with hardened operating systems and up-to-date patching.