Is i2chain.com safe?
Review i2chain.com security risks.

The following security profile for i2chain.com includes the basics you’ll need for a vendor risk assessment: security certifications, supply chain details, privacy policy, terms of service, GDPR compliance, and more.
i2chain.com Organization Details

Category

Security

Organization Details

What is i2chain.com?

i2Chain’s zero-click technology automatically “Chains” documents through encryption and classification that inject predefined access rights & policies. All actions performed on the Chained documents are recorded on an immutable ledger to harvest real-time evidence quality audit logs..i2Chain integrates with your applications, private clouds, public clouds like Google, One Drive, DropBox, Sharepoint, open and proprietary files systems like IBM, HP, etc., and most of the collaboration tools Outlook, Gmail, and others..i2Chain is among the 3 Hypergrowth Startups You Can Invest In Now for 1000X Potential.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.I2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain ranked “2020 Red Herring Top 100 North America Winner”..i2Chain Inc. is ranked as North America’s Top 100 startup finalists by Red Herring Publishing..i2Chain is featured for the “Highly Trusted Cyber Security Solution Providers In 2020”.i2Chain cybersecurity startup awarded the global TiE50 Winner at the TiEcon2020.i2Chain wins Grand Prize awarded by Citizens Bank.i2Chain licenses biometric multi-factor authentication innovation from University of Memphis.i2Chain is among the 3 Hypergrowth Startups You Can Invest In Now for 1000X Potential.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.I2Chain Named Winner of the Global InfoSec Award during RSA Conference 2021.i2Chain ranked “2020 Red Herring Top 100 North America Winner”..i2Chain Inc. is ranked as North America’s Top 100 startup finalists by Red Herring Publishing..i2Chain is featured for the “Highly Trusted Cyber Security Solution Providers In 2020”.i2Chain cybersecurity startup awarded the global TiE50 Winner at the TiEcon2020.i2Chain wins Grand Prize awarded by Citizens Bank.i2Chain licenses biometric multi-factor authentication innovation from University of Memphis

Headquarters

Hosting

Hosting locations

Security Program

Security Certifications

SOC2 Compliance
PCI Compliant
HIPAA Compliant
SOC2 Compliance
SOC 2 Compliant
GDPR Compliant
ISO 27001 Compliant
FedRamp Compliant
CSA Star Level 1
Compliant

Security Page

Security Portal

Bug Bounty

Vulnerability Disclosure

Terms of Service

Privacy Policy

Status Page

Authentication

Authentication / SSO

Supported Okta Features
Login with Google support
Login with Microsoft support
Supports SSO
Two-factor authentication via SMS
Two-factor authentication via E-mail
Two-factor authentication via Hardware
Two-factor authentication via Software
Two-factor authentication via TOTP
Two-factor authentication via U2F

OAuth Details

i2chain.com Supply Chain
  • Office
  • Mailjet
i2chain.com Subdomains
  • sip.i2chain.com
  • autodiscover.i2chain.com
  • track.i2chain.com
  • lyncdiscover.i2chain.com

Regain control of SaaS security.

Nudge Security discovers all SaaS accounts ever created by anyone in your org within minutes of starting a free trial. Get a full SaaS inventory today, along with insights and automation to improve your SaaS security posture.

was able to find all this and much more.
Nudge was able to find all this and much more.
Nudge Security provides detailed security profiles for thousands of SaaS apps. Sail through security assessments with our proprietary intelligence on vendors’ security, risk, and compliance programs.
Stop chasing down answers. Start a free 14-day trial of Nudge Security to learn:
Stop chasing down answers.
Start a free 14-day trial of Nudge Security today.
Who’s using i2chain.com in your org?
What data does i2chain.com have access to?
What is i2chain.com’s breach history?
What apps are in i2chain.com’s supply chain?