Skip to content
v2-vertical-white-orangedot

Security Overview

IMI Software Labs' security program is designed to keep customer information safe and secure

In a modern and connected world, it is imperative that customers operate and use their cloud-based SaaS solutions in a safe and secure way.

At IMI Software Labs, security is more important now than ever and with our SaaS service Rhonda.ai, we have engineered it with security technologies as the foundation and built our organizational culture with security in mind.

This page outlines how we engineer security practices and technology into our products so our customers can be confident they are safe and secure. 

1-Feb-17-2022-10-27-32-46-PM

Secure Cloud Infrastructure

Rhonda.ai is built on Microsoft Azure as our premier secure cloud provider.

  • Rhonda.ai uses best-in-class secure cloud infrastructure provider, Microsoft Azure, to host the Rhonda platform

  • Rhonda.ai leverages years of security enhancements that Microsoft Azure offers with their Platform as a Service (PaaS) services to better protect against security incidents

  • Rhonda.ai uses automatic vulnerability assessments, advanced threat protections 24x7 allowing us to respond and resolve adverse events

  • The Azure platform maintains regular, independent security audits including SOC I, SOC II, and SOC III

2-Feb-17-2022-10-27-26-91-PM

Data Encryption

IMI Software Labs uses a combination of the Advanced Encryption Standard (AES 256) and Transport Layer Security (TLS 1, 2 P-256) to help keep sensitive data safe.   

3-Feb-17-2022-10-27-27-06-PM

Data Isolation

Data isolation across pre-production and production environments is enabled by using Azure Active Directory & Role Based Access Control (RBAC) to ensure there is no cross-contamination of test data and customer data.

4-3

Threat Detection & Mitigation Process

IMI Software Labs uses Azure Security Center as our centralized solution for strengthening our security posture across our infrastructure. With Azure Defender we leverage the continuous vulnerability assessments, threat protection capabilities to protect the resources & workloads

5-1

Strong Authentication

Rhonda.ai uses industry-leading identity and authentication management in our products.  We adhere to the best-in-class compliance frameworks to ensure information security across the board.

6-1

Secure Monitoring

IMI Software Labs continuously monitors with our 24/7 on-call team to help rapidly respond and resolve critical issues.   As an organization, IMI Software Labs is focused on building a cohesive security culture that include processes and protocols to address:

  •  Data protection

  •  Incident management

7-1

Business Continuity / Disaster Recovery

IMI Software Labs' business continuity planning covers a broad range of organizational and product process to ensure seamless customer experiences, secure data backup and safe workplace practices in the event of a disaster or emergency.