Security & Privacy at IXN Solutions
Last Updated: 2 April 2026
Protecting What Matters Most
At IXN Solutions, security and privacy are not add-ons. They are our mission.
As a counterintelligence and insider-risk company, we protect data, systems, and people with the same rigor trusted by defense, energy, and critical-infrastructure organizations across the United States.
🛡️ Our Security Commitment
Defense-Grade Security for the Private Sector
We apply government-level counterintelligence discipline to every layer of our operations, from the software that powers 351X to the data that fuels your insider-risk program.
- Data Encryption: All customer data is encrypted in transit (TLS 1.2+) and at rest (AES-256).
- Secure Hosting: 351X is hosted in U.S.-based data centers that meet or exceed SOC 2 Type II standards.
- Identity & Access Controls: Multi-factor authentication (MFA), least-privilege role design, and session monitoring ensure only authorized access.
- Continuous Monitoring: 24/7 anomaly detection and audit logging across cloud and application layers.
- Vulnerability Management: Regular scanning, third-party penetration testing, and rapid patch cycles protect against emerging threats.
🔍 Privacy by Design
Your Data Belongs to You
IXN Solutions follows strict privacy-by-design and data-minimization principles throughout product development and client operations.
- No Hidden Collection: We collect only data necessary to deliver contracted services.
- Customer Data Ownership: You retain full ownership of your uploaded and generated content.
- GDPR & U.S. Compliance: Our policies align with GDPR, SOC 2 Type 2, CMMC, NIST 800-171, and SEAD-3 privacy and reporting requirements.
- Data Residency: All production data resides within the United States.
- Retention Controls: Clients can set custom retention schedules to meet organizational or regulatory mandates.
⚙️ 351X Platform Security Overview
The 351X Insider Risk Management SaaS combines automation and counterintelligence tradecraft to safeguard sensitive information across your enterprise.
- Zero-Trust Architecture: Every API call and user session is authenticated and continuously verified.
- Secure Data Segmentation: Tenant data is logically isolated per customer.
- Case Auditability: Built-in logging provides full transparency for compliance audits.
- Disaster Recovery & Backups: Encrypted AWS S3 backups ensure resilience and business continuity.
🧠 Employee Security Culture
Every IXN employee and contractor completes:
- Annual Information Security & Insider Threat Awareness training.
- Role-based Access Control and Incident Reporting certifications.
- Background screening and confidentiality agreements in accordance with U.S. federal contractor requirements.
Security isn’t just our policy. It’s our culture.
🤝 Third-Party Risk & Vendor Management
IXN Solutions evaluates every third-party partner through a documented Vendor Security Review Process that includes:
- Security questionnaire and SOC 2 attestation review.
- Data protection agreement (DPA) enforcement.
- Continuous monitoring of vendor compliance status.
📄 Incident Response & Customer Notification
Should a security or privacy incident occur:
- Immediate triage and containment.
- Root-cause analysis and mitigation.
- Client notification within contractually defined timeframes.
- Post-incident review and control enhancement.
🔗 Security Resources & Contacts
Email: security@ixnsolutions.com
PGP Key: Available upon request
Last Updated: March 2026
🧩 Why It Matters
Security and privacy are the foundation of trust.
By choosing IXN Solutions and 351X, you partner with a team that blends operational counterintelligence experience with advanced SaaS engineering, delivering the visibility, compliance, and assurance required in today’s threat landscape.
