Security & Privacy at IXN Solutions

Last Updated: 2 April 2026

Protecting What Matters Most

At IXN Solutions, security and privacy are not add-ons. They are our mission.
As a counterintelligence and insider-risk company, we protect data, systems, and people with the same rigor trusted by defense, energy, and critical-infrastructure organizations across the United States. 

🛡️ Our Security Commitment

Defense-Grade Security for the Private Sector

We apply government-level counterintelligence discipline to every layer of our operations, from the software that powers 351X to the data that fuels your insider-risk program.

  • Data Encryption: All customer data is encrypted in transit (TLS 1.2+) and at rest (AES-256).
     
  • Secure Hosting: 351X is hosted in U.S.-based data centers that meet or exceed SOC 2 Type II standards.
     
  • Identity & Access Controls: Multi-factor authentication (MFA), least-privilege role design, and session monitoring ensure only authorized access.
     
  • Continuous Monitoring: 24/7 anomaly detection and audit logging across cloud and application layers.
     
  • Vulnerability Management: Regular scanning, third-party penetration testing, and rapid patch cycles protect against emerging threats.

🔍 Privacy by Design

Your Data Belongs to You

IXN Solutions follows strict privacy-by-design and data-minimization principles throughout product development and client operations.

  • No Hidden Collection: We collect only data necessary to deliver contracted services.
     
  • Customer Data Ownership: You retain full ownership of your uploaded and generated content.
     
  • GDPR & U.S. Compliance: Our policies align with GDPR, SOC 2 Type 2, CMMC, NIST 800-171, and SEAD-3 privacy and reporting requirements.
     
  • Data Residency: All production data resides within the United States.
     
  • Retention Controls: Clients can set custom retention schedules to meet organizational or regulatory mandates.

⚙️ 351X Platform Security Overview

The 351X Insider Risk Management SaaS combines automation and counterintelligence tradecraft to safeguard sensitive information across your enterprise.

  • Zero-Trust Architecture: Every API call and user session is authenticated and continuously verified.
     
  • Secure Data Segmentation: Tenant data is logically isolated per customer.
     
  • Case Auditability: Built-in logging provides full transparency for compliance audits.
     
  • Disaster Recovery & Backups: Encrypted AWS S3 backups ensure resilience and business continuity.

🧠 Employee Security Culture

Every IXN employee and contractor completes:

  • Annual Information Security & Insider Threat Awareness training.
     
  • Role-based Access Control and Incident Reporting certifications.
     
  • Background screening and confidentiality agreements in accordance with U.S. federal contractor requirements.
     

Security isn’t just our policy. It’s our culture.

🤝 Third-Party Risk & Vendor Management

IXN Solutions evaluates every third-party partner through a documented Vendor Security Review Process that includes:

  • Security questionnaire and SOC 2 attestation review.
     
  • Data protection agreement (DPA) enforcement.
     
  • Continuous monitoring of vendor compliance status.

📄 Incident Response & Customer Notification

Should a security or privacy incident occur:

  • Immediate triage and containment.
     
  • Root-cause analysis and mitigation.
     
  • Client notification within contractually defined timeframes.
     
  • Post-incident review and control enhancement.

🔗 Security Resources & Contacts

Email: security@ixnsolutions.com
PGP Key: Available upon request
Last Updated: March 2026 

🧩 Why It Matters

Security and privacy are the foundation of trust.
By choosing IXN Solutions and 351X, you partner with a team that blends operational counterintelligence experience with advanced SaaS engineering, delivering the visibility, compliance, and assurance required in today’s threat landscape.