InsideView and Security


About InsideView Sales

InsideView provides CRM Intelligence for Sales professionals. The service is available via our website or via a frame in the user’s browser (commonly called a “mashup”), that appears as a pane in their CRM view. The mashup is a package installed by the customer’s CRM administrator.

Data Involved

The mashup uses an HTTP POST to query information from the record in the customer’s CRM against InsideView’s database, returning the information to the InsideView mashup frame. InsideView does not save the customer’s CRM content, and the customer’s CRM is not updated with InsideView information without enabling InsideView within CRM. Customer passwords are hashed to prevent unauthorized access in the case of a breach or data leak.

InsideView as available on our website relies upon the individual user to submit contacts to query against for a return of data to the InsideView web page. The contact data are not written to the InsideView product database, they are only available to the individual user.


InsideView Sales is served from our own equipment collocated in CenturyLink’s data center in Santa Clara, California.

User connections to the InsideView application are encrypted in transit from the user’s browser via SSL 3.0/TLS 1.2, with perfect forward secrecy (PFS) enabled. A perimeter firewall filters public and customer traffic and allows a VPN for administrative traffic. A load balancer distributes traffic among application servers for optimal responsiveness.

Application and database servers run Unix (Solaris) with a limited set of services enabled. Connections from the application servers to the databases are through a second firewall. Customer transactions are brokered by the InsideView application, and customers have no direct access to either the OS or applications (database, utilities, etc.) in our environment. Storage is backed up to encrypted tapes that are transported offsite by a bonded provider.

The environment is managed by a small team of authorized administrators over a VPN that requires two-factor authentication; the customer-facing network is physically and logically separate from InsideView corporate networks.

Security Monitoring

Hosts and networks are monitored for threats and suspicious activity, including network intrusion detection (NIDs), file integrity monitoring (FIM), and internal vulnerability scanning. Events from these systems are aggregated into a security information and event management system (SIEM), which is monitored in a 24 x 365 security operations center (SOC). Alerts from the SIEM are evaluated in the SOC and escalated to InsideView Security and IT personnel.

Environmental Controls

Electrical power is provided to systems via power distribution systems with dual paths. Cooling systems are managed centrally to ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) standards. Backup power is provided by onsite generators with a 48 hour fuel supply. Power and cooling systems are minimum N+1 redundant.

Fire suppression systems include VESDA (very early smoke detection apparatus) and dry-pipe sprinklers.

Physical Security

InsideView systems are housed in locked racks inside the data center facility. Only authorized personnel may physically access the computing area; data center personnel do not have logical access to InsideView systems. Access by InsideView personnel to the data center requires approval by InsideView and registration with onsite security. Doors are controlled by card readers and PINs, and include mantrap entry monitored by security personnel. Video cameras throughout the facility and badge reader systems are also monitored by onsite security.

Privacy and Compliance

Please see our full Privacy statement at:

InsideView certifies to the Safe Harbor framework for personal information received from the EU/EEA and/or Switzerland:

Was this article helpful?
0 out of 0 found this helpful
Powered by Zendesk