Interceptis
Loading...
Now available — Interceptis Intelligence Module with AI-powered entity graph. Learn more
Interceptis
Loading...
Interceptis is built from the ground up to meet the most demanding public safety security and compliance requirements. Security is not a feature — it is the foundation.
Full compliance with FBI Criminal Justice Information Services security requirements including encryption, access control, and audit logging.
Independent third-party audit confirming controls for security, availability, processing integrity, confidentiality, and privacy.
Cryptographic modules validated to federal standards for information processing by the U.S. and Canadian governments.
Architecture designed to meet Federal Risk and Authorization Management Program requirements for cloud services.
Multiple layers of security controls protect your data at every level of the stack.
256-bit AES encryption for data at rest. TLS 1.3 for all data in transit. Hardware security modules (HSMs) for key management. No unencrypted data — ever.
Role-based access control with attribute-level permissions. Multi-factor authentication required. Single sign-on (SSO) integration with SAML 2.0 and OIDC.
Every action — login, record view, edit, export, configuration change — is logged with timestamps, user identity, and IP address. Logs are immutable and retained for 7+ years.
Each agency operates in a logically and cryptographically isolated environment. No data commingling between tenants. Dedicated encryption keys per agency.
Deployed on SOC 2 and FedRAMP-authorized cloud infrastructure. Geo-redundant with automatic failover. 99.99% uptime SLA with continuous monitoring.
Customer-managed encryption keys available for Enterprise plans. Key rotation policies enforced automatically. Integration with agency key management infrastructure.
24/7 security operations center monitoring. Real-time threat detection and automated incident response. Regular vulnerability scanning and penetration testing.
Documented incident response procedures with defined SLAs. Automatic breach notification within regulatory timeframes. Post-incident review and remediation tracking.
Data stored in CONUS data centers only. On-premise and hybrid deployment options for agencies with specific residency requirements. No offshore data processing.
Web application firewall (WAF) protection. DDoS mitigation. IP allowlisting available. Private network peering for high-security deployments.
Automated dependency scanning in CI/CD pipeline. Quarterly third-party penetration testing. Responsible disclosure program with bug bounty.
Built-in compliance reporting for CJIS audits. Automated evidence collection for SOC 2. Policy enforcement through infrastructure-as-code.