Features
Use Cases
Marketplace
Resources
Pricing
Try it FreeSign In

Trust Center

Trust MattersTerms of UsePrivacy PolicyCookie PolicySubprocessorsDPAAccessibilityStudent Policy

Because without it, over 100,000 people would have used a different solution.

Security

Like a watchdog that never sleeps

Work in peace and know that we have your back when it comes to security. Our approach is based on the NIST Cybersecurity Framework (CSF) and we undergo external audits to check that our controls meet SOC 2 Trust Service Principles for security and confidentiality.

Infrastructure

Starting with the foundation

Our infrastructure leverages world-class hosting centers that are trusted by organizations all over the world. It’s a foundation we put in place to stay up-to-date and support you using industry standards.

Application

How we build what we build

We don’t just build software. We continuously try to break it in pursuit of a stronger application for you to use. Our build processes include A LOT of testing, like automated security regression, application penetration testing, and environment vulnerability testing using current threat databases.

Application

How we build what we build

We don’t just build software. We continuously try to break it in pursuit of a stronger application for you to use. Our build processes include A LOT of testing, like automated security regression, application penetration testing, and environment vulnerability testing using current threat databases.

Encryption

Encoding your digital data

With iorad, all the data communications involving the application are encrypted. This requires and enables the latest industry-standard cryptographic protocols (TLS 1.2 and 1.3). Ever see the movie The Matrix? Yea, it’s kind of like that.

Access Management

Sign-in and Roles

We offer SAML single sign-on (SSO) or standard passwords that use salted hash, so nobody, including us, can read them. Once you’re in, iorad lets you control different levels of access within the application based on the account and plan type you’re using. This access can range from view only, to editing and full account administration.

Privacy

International regulation and GDPR

We’re committed to protecting your data and privacy. That’s why we design our practices to comply with international privacy regulations, including General Data Protection Regulation (GDPR). But that’s just the tip of the iceberg, to learn more, be sure to read through our Privacy Policy.

Built-in Tools for Sensitive Information

More ways we help you stay safe

When you use iorad to create a tutorial, none of the keystrokes that occur within the recording frame are logged during capture. We don’t store any of that information. We also built in a masking tool that lets you permanently blur any sensitive information that shows up in the screenshots of your tutorial.

Accessibility

For anyone and everyone

Our roots run deep when it comes to eLearning. That’s what helped us get our start and it’s what we remain committed to providing for people of all abilities. Learn more about how iorad approaches accessibility for all here.

Our Trusted Partners

iorad logo
SupportSchedule DemoContact Us
SupportHelp CenterFAQIntegrationsBlog
PricingPersonal BusinessEducationNon-profit
CompanyLeadership HistoryCultureCareersPress Releases
PartnersTechnologyServiceHelping HandsCreator Collective
Fine PrintTerms of UsePrivacy PolicyCookie PolicyAccessibilitySystem Status
Terms of UsePrivacy PolicyContact
© Copyright 2024 – iorad Inc. All rights reserved.
LinkedinFacebookInstagramYoutubeTwitter