Security and compliance

A holistic approach to security and compliance, across the entire platform value chain, from on-premises infrastructure to public cloud.

All companies on Intility are protected by an enterprise-grade security platform and a 24/7 Security Operation Center, delivered as a service.
Intility security and compliance

A complete platform service that provides protection in a constantly evolving threat landscape.

24/7 Security Operations Center
Intility includes a 24/7 Security Operation Center with insight and control across the entire platform value chain. Delivered as an included service for all companies on Intility.
Security Platform
An enterprise-grade security platform, delivered as a service. Continuously upgraded and developed to protect companies with the highest security standards.
Vulnerability Assessments
Intility performs continuous vulnerability assessments across the entire platform value chain as an integrated part of a holistic and proactive approach to security.
Incident Management
Intility is Single Point of Contact for all types of security incidents around the clock, every day. Intility’s incident management is carried out in close collaboration with other specialized departments across the platform value chain.
Compliance
Comprehensive compliance auditing and reporting is conducted on behalf of all companies on Intility, providing compliance and audits when dealing with auditors and other external stakeholders.

Security consulting

A large team of lawyers and security experts with in-depth knowledge of each customer’s IT platform, provides consulting and advisory services in close collaboration with other specialized departments within Intility.
Reference

Entra Eiendom on Intility

Entra Eiendom is one of Norway’s leading real estate companies. The company is listed on the Oslo Stock Exchange and owns and manages approximately 1.3 million square meters of office and commercial property in Oslo, Bergen, Drammen, Sandvika, and Stavanger. 70,000 people frequent Entra’s buildings every day.
Why holistic security

A holistic approach to security and compliance offers several advantages compared to traditional models

Hardened IT platform
Intility’s specialized departments are each responsible for hardening all components in the platform’s value chain. This is carried out in close collaboration with the security management department, and is crucial to a secure IT platform.
Continuous upgrades
A service-based security platform enables continuous security upgrades and hardening measures that benefit all companies on Intility, providing effective protection in a rapidly evolving threat landscape
Proactive security
Intility includes an ecosystem of software that streamlines management of your IT environment. The software is pre-integrated and populated with customer data. This provides deep insights and automated workflows from day one.
Single point of contact
Standardization, combined with insight and control across the entire platform value chain, enables automated operational tasks and efficient identification and handling of issues. Issues affecting one customer are proactively handled across all customers. This increases security and provides a robust IT platform.
Compliant IT environment
An industrialized approach to infrastructure and operational tasks enables a level of compliance reporting that would be too costly and resource-intensive to achieve through dedicated infrastructure and traditional IT operations models.

Context-based consulting

Detailed insight into each company’s IT platform and associated services, contributes to effective, high-quality consulting across the entire platform value chain. Intility’s security experts and lawyers have in-depth knowledge of each customer’s IT environment.

Security Center for insight into your own security posture, activated services, and security news center

Intility Security Center (ISC) provides insight into the security and governance status of every customer environment on Intility. ISC offers real-time information on software vulnerabilities, activated security services, as well as firewall and network segmentation rules.