Handlebars.registerPartial('myPartial', '');




Travel & Hospitality








Data & Governance

Apply enterprise-grade security measures

Every organization needs to ensure that its customer data stays secure and is not exposed, leaked, or lost. Enterprise-grade security measures can minimize the risks associated with managing sensitive data.

1. Single Sign On (SSO) login.

SSO allows your customers to manage their team’s users outside of your built-in user table. SSO centralizes the database of users into a single service that controls authorization to all accounts and applications.

Besides, SSO enables you to add an extra layer to your organization’s security policy by allowing users to log into applications hosted on an internal server.

With Intempt, you can authenticate with a selected Identity Provider that will enable you to use a plethora of services without having to log in and out each time.


2. Administer role-based access controls.

Enforce source-level role-based access to the members of your organization. All permissions cascade from sources to other products and tools used in the platform. RBAC will enable you to Identify all excessive privilege, escalation, and separation of duty across different roles.

In Intempt Platform, there are three different roles:

-  Organization owner. The owners have complete administrative access to your organization, including access to delete organizations.

-  Organization admins. They have full read and edit access to everything in the organization, including Sources, Destinations, other products, and settings. Owners have full edit access to all permissions.

-  Organization members. By default, organization members can view the organization without access to any sub-resources. You need to configure additional permissions.


Organization owners can set admin and member roles. Admins can set member roles that are limited to specific sources.

For example, the organization “Moxie Marketing” has a marketing specialist John, responsible for managing www.moxiemarketing.com (it has a web tracker source installed). Based on his company’s role, John should be accountable for the operations that involve the website data. Due to this reason, the organization admin gave him the rights to manage this source and all events and segments that cascade from it.

3.Apply PII access control.

With PII Access, you can selectively control which users or groups of users see PII. You can set up different PII access for every organization member. This ensures that your customer data will not be exposed to unauthorized members of the team.

To set PII control, you need to do two things:

-  Enable PII access for different organization members in “Settings -> Users.”

-  In “Data -> Collections,” enable PII option for selected attributes that have personal customer information (e.g., email, first name, last name, phone number, loyalty card number)


4. Monitor access to information with Audit logs.

Audit logs are the centralized stream of all user activity within a team. Part of the security and compliance program of any large enterprise is designed to control and monitor information access within the organization.

With Intempt, you can use an audit trail to prevent suspicious activity when it starts (if actively monitored) or to playback account activity during an incident review.


5.Choose your VPC hosting option.

Choose flexible hosting without compromising the security and privacy requirements. Customers can start operating their organization hosted in Intempt‘s VPC (which is simpler to set up and manage) or their own VPC. As their team grows and security/privacy requirements become more complex, they can take ownership and run it on-premise.

arrow image

Get started

Acquire, Engage & Retain throughout the
Customer Lifecycle