For product guidance visit

For product guidance visit

For product guidance visit

Intranet security

Fail-safe protection for your people and information

Intranet security - hero graphic
SaaS

Invotra Auth

Protecting your information is central to how Invotra works. Single Sign-On with Invotra Auth removes the threat that comes from passwords and user error, while IP address blocking gives you extra control and peace of mind. 

In administration, you can also set permissions for internal and external users to limit their access and capabilities.

Single Sign-On (SSO)

SSO is the fastest and most reliable way for users to access their intranet. There is no need for passwords or forgotten passwords or password resets, just power up your device and you’re live. 

To dramatically reduce the risk of security breaches such as hacking, Invotra works with you to integrate SSO into your existing security requirements and systems.

SaaS

Invotra Auth

Protecting your information is central to how Invotra works. Single Sign-On with Invotra Auth removes the threat that comes from passwords and user error, while IP address blocking gives you extra control and peace of mind. 

In administration, you can also set permissions for internal and external users to limit their access and capabilities.

Single Sign-On (SSO)

SSO is the fastest and most reliable way for users to access their intranet. There is no need for passwords or forgotten passwords or password resets, just power up your device and you’re live. 

To dramatically reduce the risk of security breaches such as hacking, Invotra works with you to integrate SSO into your existing security requirements and systems.

Responsibility and control

Manage the roles and permissions of every user on your intranet.

Roles and permissions graphic

Roles and permissions

Who can do what and where. Webmasters control every user’s permissions in administration or in a user’s profile account settings. 

There are multiple global roles that range from blogger to previewer to brand manager.  Alternatively, local roles for individual areas and sections are for distributed publishing teams to manage their content as authors, editors and publishers.

Access control​

Lock down the content you only want certain users to see. This might be an external collaborator accessing your intranet through Invotra Portal.

In Groups, users can determine their own access controls by choosing if a group is secret, private or public.

USer blocking option found in Admin

Blocking

If someone leaves your enterprise, block their access immediately and reassign their content someone else in administration. 

You can also block IP addresses, which is an effective way to defend yourself against a publicised cyber threat.

Our team's commitment

Our customers include some of the most demanding departments in UK central government.

As a result, we are held to the highest international standards for securityand governance. Our team proudly uphold these standards to keep your intranet secure.

ISO 21001:2013 certification

ISO 27001:2013 accredited

The International Organisation for Standardisation (ISO) 27001:2013 certificate is for organisations that have a systematic approach to managing sensitive information so that it is always secure. It includes people, processes and IT systems, and we are measured against 35 security categories with 114 controls in place. Invotra undertook a recertification in March 2019, passing with 0 major or minor non-conformities. 

Read our blog on security and ISO 27001, including 6 steps to making your workplace more secure.

Part of CiSP

We are proudly part of the joint industry and government initiative,  Cyber Security Information Sharing Partnership (CiSP),. It is the exchange of cyber threat information in a secure, confidential and dynamic environment. We value the part we play in protecting business from cyber threats by sharing our experiences with other organisations.

cisp logo

Compliance

We constantly track our performance against SLAs to identify non-compliance. Our reports are generated directly from the cloud and are based on verified data.

Newsletter