Data Security and Trust
at Intrigma

Some of the country's largest healthcare provider organizations trust Intrigma to keep their data safe.

TeladocNextCareUW MedicineCityMDLegacy HealthIndigo logo
Intrigma Secure and safe

At Intrigma we take security seriously and prioritize it in all our operations. Every year, we undergo SOC 2 Type 2 + HITRUST certification to ensure that our systems and processes meet the highest standards of security. We continuously monitor and update our practices to provide a secure environment for our customers' data.

How Intrigma Protects your Data

Intrigma takes a security-by-design approach to protecting your data. We build our platform using best practices for highly available, scalable, and secure cloud applications.

Data protection is key to support your organization's success, so we incorporate security into our product and operations. This includes compliance with GDPR and using 2048-bit SSL certificates.
Reliability: We invest in our infrastructure to support deployments of 100 or 100,000 and beyond.
Privacy: We have a comprehensive privacy compliance program that aligns our practices with regulations such as the General Data Protection Regulation (GDPR).
Compliance: We adhere to global, regional, and industry regulations to help you meet compliance standards.

Security Infrastructure and HIPAA 

Intrigma's infrastructure is designed with layers of protection to help ensure your data is secure while transmitted, stored, or processed. Protections include encryption, least privilege access, secure software development. We strive to provide the highest availability and uptime for our services according to industry standards. Intrigma is committed to ensuring the privacy and security of our clients' protected health information (PHI) in accordance with the Health Insurance Portability and Accountability Act (HIPAA). Our platform has been designed to meet the strict HIPAA regulations for the storage and transmission of PHI, and we have implemented comprehensive security measures to protect this information. This includes access controls, data encryption, regular security audits, and backup and disaster recovery protocols. Additionally, we regularly undergo independent third-party assessments to verify our compliance with HIPAA standards. At Intrigma, we take the protection of PHI seriously and work tirelessly to maintain the trust of our clients and the integrity of their data.

Monitoring, Business continuity, Backup, and Disaster Recovery

Intrigma's infrastructure investments provide daily backups, regional backups, and recovery procedures for restoring services in the event of unavoidable failures. Intrigma offers 24/7 priority support and a 99.9% uptime commitment to Enterprise customers, and provides transparency into real-time and historical


Under the Health Insurance Portability and Accountability Act (HIPAA), certain information about a person’s health or health care services is classified as electronic Protected Health Information (ePHI).

Intrigma’s software products can be used in connection with ePHI including electronic data exchange with health record systems. Such a data exchange can be accomplished in a secure manner using Intrigma’s application programming interface (API). To learn more about integrating external solutions, please contact our support team at

Vulnerability Testing Procedures, Firewalls, Transit Security, and Encryption

Intrigma maintains security policies and procedures and runs regular automated vulnerability and penetration tests on its systems. We employ an advanced firewall to prevent unauthorized access to sensitive services and data.

Intrigma’s solution has three user interfaces:

01 Protect your work

Intrigma takes a security-by-design approach to protecting your data. We build our platform using best practices for highly available, scalable, and secure cloud applications.

02 Product security and Single Sign-On (SSO)

Intrigma provides a robust set of in-product data protection and for greater visibility and control over your data. Enterprise admins can securely deploy I to their organizations with two-factor authentication, SSO, and SAML 2.0.

03 Operational Security

Our information security team continuously implements new security controls and monitors Intrigma for malicious activity across physical data centers, networks, and IT devices.

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

Privacy preferences