Revolutionizing
What we do
We empower people and organizations to make information relevant to create change.
Preventum

Mesearchr

Security
Security is job one. Everything from code access, server and infrastructure access, and data access is controlled using industry best practices and guidelines. iPug has a security best practice and guidelines policy in place that all employees, contractors and associated entities adhere to. Access keys and encryption keys use recognized standards for creation, storage and transmission. Access is only be granted on an as-needs basis with regular audits in place to determine if existing access rights and permissions are still required.
iPug’s platform utilize end-to-end SSL encryption for its management and end user portals and mobile app technologies. Communications within the network adhere to best practice guidelines and are conducted in a secure way with restrictions in place to ensure only the relevant services can access what they need and when.