By role

ITILITE Trustcenter

Making great experiences requires trust.

At ITILITE, we’re committed to protecting the privacy security, and availability of our products.

Industry – based Compliance

ITILITE is dedicated to continuously improving the security, technical and organizational measures to better protect the customer data and sensitive information shared with us. We are always evaluating industry standard practices regarding technical data privacy and information security & strive to meet or exceed those standards. Our security programs are comprehensive and dedicated to all facets of safety.

ITILITE holds the following trusted security certifications for which we are audited regularly.

Backstage Practices

ITILITE being a custodian of customers’ data, a Zero-Trust model of security architecture, robust product delivery, and a highly resilient service platform are the key tenets of its service delivery.

Securing your data

The multi-tiered data security model

Committed to security

End-to-end security integrated into the product lifecycle

Highly Resilient Architecture

Our system availability and performance at all times.

Component redundancy

We understand the value of personal data. With our robust system of data safeguards, we allow you to focus on the data rather than on its security – So your data is protected first. Not last our secure cloud partners

Gateway Security

Our network security architecture consists of multiple security zones. More sensitive systems, like database servers, are protected in our most trusted zones.

Anti-Malware & Spam Protection

Anti-Malware solution and Spam protection applied based on latest threat signatures and threat intelligence ensuring end-user platform security.


AES 256 bit encryption with 1,024-bit key-strength for data at Rest and FIPS 140-2 compliant TLS encryption for data in transit.

Access Controls

Role-based access through an explicit need-to-know basis utilizes the least privilege & two-factor authentication and end-to-end audit trails ensuring access monitoring.

Secure Product Build

Information security and data privacy requirements are baked into every release cycle and form part of the blueprint considerations of the product.

Quality Assurance

Builds are put through stringent functionality tests, performance tests, stability tests, and Ux tests before the build is certified “Good to go”.

Product Roadmapping

The product road-map is defined and reviewed periodically by the Product Owner. Security fixes are prioritized and are bundled in the earliest possible sprint.

Code Review

All changes are tested by the Quality Assurance team and criteria are established for performing code reviews, web vulnerability assessment, and advanced security test practices.

Version Control

Source Code is managed centrally with version controls and access restricted based on various teams that are assigned to specific sprints. Records are maintained for code changes & code check-ins & check-outs.

Highly Resilient Architecture

Securing your data
All components are deployed in ‘n+1’ mode across multiple availability zones configured in active-active mode behind a load balancing service.
Highly Scalable DNS
Route users to the best endpoint based on geo-proximity, latency, health, and other considerations.
Data Backup
Near real-time backups taken across multiple availability zones in encrypted and access controlled containers.

Business Continuity and Disaster Recovery

Our Disaster Recovery (DR) program ensures that our services remain available and are easily recoverable in the case of a disaster. This is accomplished through building a robust technical environment, creating Disaster Recovery plans, and testing activities.

More Information

Itilite has a designated Data Protection Officer and a Grievance Redressal Office. If you have any questions on data privacy or process integrity, like which data is collected from you and how your data will be used, you can write to dpo@itilite.com. Depending on the nature of your query, you can expect a response within 7 to 21 business days.

Please refer to our Cookie Declaration and Privacy Policy to know more.

Simplify your travel and expense management process!

Simplify your travel and expense management process!