Network Security

Prev Next

API Security & Authentication

Insider serves its services over SSL (Secure Sockets Layer) and highly sensitive services that require authentication only over HTTPS (Hypertext Transfer Protocol Secure). This is a forced action, and HTTP (Hypertext Transfer Protocol) is not allowed for these types of services.

SSL/TLS

Insider utilizes industry-standard communication encryption technologies to ensure all communications are secure. Therefore, all end-user communications with Insider are secured with encryption. Insider uses Transport Layer Security (TLS) for regular updates and configurations.

Protection

Insider uses firewalls, secure HTTPS transfer over public networks, and the latest router technologies to ensure maximum security and protection. It also conducts in-depth audits on an ongoing basis, both internally and externally, through third-party security consultancies.

Architecture

Insider uses a demilitarized zone (DMZ) to add a layer of security to the local area network's architecture. With DMZ, services have different subnets (databases, cache layers, or application servers) based on their security levels. Each zone has its specific monitoring and access controls.

DDoS Mitigation

Insider partners with Distributed Denial of Service (DDoS) scrubbing providers to mitigate DDoS attacks. Insider works with third-party security consultancies to simulate DDoS attacks and uses Cloudflare to prevent DDoS and other security attacks.

Access Logs

Insider has implemented a comprehensive activity monitoring system for the InOne panel, which maintains logs at all account levels for user account sign-in/sign-out, user creation, user permission settings, password changes, and the creation, deletion, updating, starting, and/or pausing of personalization campaigns.

Contact the Insider One team to request access to their detailed Insider log history, including all content changes related to their personalization campaigns.