Printer Friendly and PDF

Join our established network of trust

Customers seek four essential elements of trust in the cloud: security, reliability, stability and experience. The first two speak to trust in the service. The second two speak to trust in the provider. Interactive Intelligence provides a unique, comprehensive level of trust in the cloud with all four elements.

Meet your distinct security and privacy requirements.

Companies around the world are subject to varying laws and regulations. Interactive Intelligence cloud solutions operate with consistent guidelines across multiple jurisdictions while maintaining common security and privacy requirements. They are also designed with the flexibility required to meet specific security, privacy and compliance needs.

Keep your business running with proven, reliable technology.

The Interactive Intelligence cloud solutions are powered by mature, proven technology collocated in dedicated spaces at top-tier data centers around the world. These facilities provide carrier-level support that enables us to provide a robust cloud environment to support your needs. All operations are monitored 24/7 from our Network Operations Center, allowing the visibility necessary to maintain 99.999% uptime.

Let us earn your trust.

Partner with a public company with over 20 years of experience delivering innovative solutions to over 5,000 customers worldwide. Interactive Intelligence provides you with a secure and reliable cloud environment, because your trust and confidence are our top priority.

Increase security in the cloud.

Rely on proven technology and processes to maintain consistent and reliable access, security, and privacy. Our solution is collocated at top-tier data centers and uniquely designed to offer an unmatched level of security and customer isolation.

Protect the Cloud.

Applications reside in a secure environment with advanced security technologies at multiple layers to prevent interferences or access from outside intruders and address potential threats.

  • Distributed Denial of Service (DDOS) attacks
  • Man In The Middle (MITM) attacks
  • IP spoofing
  • Port Scanning

Data centers are strictly controlled both at the perimeter and at building ingress points by professional staff with video surveillance, intrusion detection systems and other means. Access to these locations is strictly controlled and provided only to employees, contractors, and customers with a legitimate business need.

Start with the Organization.

Interactive follows an Information Security Management System (ISMS) based on the ISO 27002 standard. We consistently monitor and advance our Cloud Services security program to ensure potential threats and gaps are identified and updates occur.

The ISMS provides the framework for our documented change management procedures, secure media destruction, incident management and business continuity plans – all focused on maintaining a secure environment with a maximum level of oversight.

Protect your privacy and the privacy of your customers.

Ensure data (yours and your customer’s) stays private. Our team adheres to stringent privacy policies and procedures.

Privacy protection

Interactive Intelligence will not review, share, distribute, or reference any customer data except as provided for in the Master Service Agreement or when required by law. In accordance with the Master Service Agreement, Interactive may access customer data only for the purpose of maintaining service, preventing or responding to problems in accordance with stated SLAs, or where required by law. Interactive does not modify, use, or disclose any respective data to anyone other than the customer’s designee.

Code of conduct

Each Interactive Intelligence employee or contractor must read, sign, and follow a code of conduct that governs our actions. In addition, each employee or contractor must sign confidentiality agreements and abide by our information security management system (ISMS).

Privacy statement

For information collected on the Interactive Intelligence website, assurances are provided about the type of information collected and how we will use that information. Click here to access our website privacy policy.

Cloud Services Security Overview


HIPAA Compliance FAQ

Genesys CX17 is the NEW G-Force & Interactions! Join Us!