{"id":26919,"date":"2022-02-22T17:44:31","date_gmt":"2022-02-22T17:44:31","guid":{"rendered":"https:\/\/www.intercom.com\/blog\/?p=26919"},"modified":"2022-03-14T12:40:23","modified_gmt":"2022-03-14T12:40:23","slug":"intercom-for-enterprise-security","status":"publish","type":"post","link":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/","title":{"rendered":"Security at Intercom: How our InfoSec team protects our customers\u2019 data and trust"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a SaaS business, Intercom is a data processor: our customers entrust us with their data, which we store and process on their behalf. From the beginning, we\u2019ve considered customer data to be one of Intercom\u2019s most critical assets and focused our efforts on protecting it by building strong internal security foundations for our product and infrastructure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As we scale, we\u2019re working with larger mid-market and enterprise customers with more complex needs and specifications. We\u2019re committed to meeting the highest standards of security to protect our customers\u2019 trust and love for our product. We do that by:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Investing in your trust through compliance with industry security and privacy ISO standards or frameworks such as <\/span><a href=\"https:\/\/www.intercom.com\/blog\/announcing-soc-2-compliance\/\"><span style=\"font-weight: 400;\">SOC 2<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Shipping quickly and securely<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuous risk management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hiring and cultivating incredible talent on our Information Security team<\/span><\/li>\n<\/ol>\n<h2 id=\"investing-significantly-in-safeguarding-our-customers-trust\"><span style=\"font-weight: 400;\">Investing significantly in safeguarding our customers\u2019 trust<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The mission of the Intercom Information Security (InfoSec) team is to <\/span><i><span style=\"font-weight: 400;\">foster and safeguard customer trust<\/span><\/i><span style=\"font-weight: 400;\"> \u2013 and we think a lot about how we preserve Intercom\u2019s agility while also recognizing and mitigating the highest-rated security risks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The team\u2019s remit covers: security and abuse; governance risk and compliance; and IT. Each area is defined by a separate program of work and is supported by one or more specific teams. The overlap and synergies between these teams means we can use automation to efficiently solve problems at scale while remaining lean.\u00a0<\/span><\/p>\n<blockquote class=\"pullquote-style-one\"><p><span style=\"font-weight: 400;\">\u201cWe\u2019ve invested massively in compelling security assurance to foster and safeguard our customers\u2019 trust in Intercom, evidenced by our <\/span><a href=\"https:\/\/www.intercom.com\/blog\/announcing-soc-2-compliance\/\"><span style=\"font-weight: 400;\">SOC2 Type II<\/span><\/a><span style=\"font-weight: 400;\">\u00a0and <\/span><a href=\"https:\/\/www.intercom.com\/blog\/intercom-hipaa-2021\/\"><span style=\"font-weight: 400;\">HIPAA<\/span><\/a><span style=\"font-weight: 400;\"> attestation reports, and ISO27001 certification\u201d<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">We\u2019ve invested massively in compelling security assurance to foster and safeguard our customers\u2019 trust in Intercom as a product, but also as a company, evidenced by our <\/span><a href=\"https:\/\/www.intercom.com\/blog\/announcing-soc-2-compliance\/\"><span style=\"font-weight: 400;\">SOC2 Type II<\/span><\/a> and HIPAA attestation reports, and <span style=\"font-weight: 400;\">ISO27001 c<\/span><span style=\"font-weight: 400;\">ertification.<\/span><\/p>\n<h2 id=\"shipping-quickly-and-securely\"><span style=\"font-weight: 400;\">Shipping quickly \u2013 and securely<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Intercom\u2019s success depends on being able to move fast through the implementation of robust, efficient, and secure business processes. Our InfoSec team members implement guardrails rather than gates by leveraging our skills to make balanced security risk management decisions.\u00a0<\/span><\/p>\n<blockquote class=\"pullquote-style-one\"><p>\u201cUnderstanding the guardrails we need to build means closely tracking meaningful change across Intercom and making sure we\u2019re on top of new initiatives\u201d<\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Understanding the guardrails we need to build means closely tracking meaningful change across Intercom and making sure we\u2019re on top of new initiatives. In most SaaS companies, R&amp;D is the organization that innovates the most, and therefore introduces the highest level of potentially risky change.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Intercom is no exception. \u201c<\/span><a href=\"https:\/\/www.intercom.com\/blog\/shipping-is-your-companys-heartbeat\/\"><span style=\"font-weight: 400;\">Shipping is our heartbeat<\/span><\/a><span style=\"font-weight: 400;\">\u201d has been the motto of the Intercom R&amp;D org from the very beginning and engineers ship code to our customer-facing production app dozens of times a day. This is where products are born, where they develop, and where they modify the company\u2019s exposure to the internet and to web security threats in particular.\u00a0<\/span><\/p>\n<blockquote class=\"pullquote-style-one\"><p>\u201cBeing embedded within the R&amp;D org means that Intercom\u2019s InfoSec team is closer to this risk while retaining company wide visibility and impact\u201d<\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">This level of velocity is a delight for both our customers and engineers, but introduces the potential for risky changes. That\u2019s why we embedded Intercom\u2019s InfoSec team within the R&amp;D org and why it reports directly to the CTO, meaning that we are closer to this risk while retaining company-wide visibility and impact.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As engineers and Technical Program Managers (TPMs) ourselves, our team can more efficiently mitigate any risk by designing processes and security controls that preserve engineers\u2019 ability to move fast \u2013 we are effectively able to build security into the product and culture from the inside.<\/span><\/p>\n<h2 id=\"evolving-our-security-program-through-a-continuous-process-of-risk-management\"><span style=\"font-weight: 400;\">Evolving our security program through a continuous process of risk management<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Intercom\u2019s security engineering program is designed to assist R&amp;D in securing one of their most critical business activities: <\/span><i><span style=\"font-weight: 400;\">shipping secure products fast, early, and often<\/span><\/i><span style=\"font-weight: 400;\">. It is supported by two teams who focus on incident management and threat detection, the eradication of classes of vulnerabilities by building on the secure defaults of our <\/span><a href=\"https:\/\/rubyonrails.org\/\"><span style=\"font-weight: 400;\">Rails<\/span><\/a><span style=\"font-weight: 400;\"> monolith, and role-based security education.\u00a0<\/span><\/p>\n<blockquote class=\"pullquote-style-one\"><p><span style=\"font-weight: 400;\">\u201cIntercom\u2019s approach to security is fundamentally risk-based and relies heavily on our continuous internal security risk management process to evolve\u201d<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">While some security programs rely primarily on compliance frameworks to guide their roadmaps, Intercom\u2019s approach to security is fundamentally risk-based and relies heavily on our continuous internal security risk management process to evolve.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">External risk assessment activities such as attack surface monitoring, bi-annual pen-tests, and most importantly, <\/span><a href=\"https:\/\/bugcrowd.com\/intercom\"><span style=\"font-weight: 400;\">Intercom\u2019s public bug bounty program<\/span><\/a><span style=\"font-weight: 400;\">, ensure the effectiveness of our security controls is verified continuously and independently. All such controls and activities provide strong foundations for our compliance program to build on and deliver customer-facing security assurance to inform our Sales team\u2019s deals.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While all of that makes us confident, we remain humble, as stated in our <\/span><a href=\"https:\/\/www.intercom.com\/blog\/sharing-intercoms-values\/\"><span style=\"font-weight: 400;\">company values<\/span><\/a><span style=\"font-weight: 400;\">. People, processes, and tools each introduce a degree of complexity \u2013 guaranteeing 100% security all the time, and therefore zero security incidents, is just unrealistic.\u00a0<\/span><\/p>\n<blockquote class=\"pullquote-style-one\"><p>\u201cEverybody at Intercom is responsible for factoring security into our day-to-day decisions\u201d<\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">At Intercom, we expect incidents to occur, prepare for them, and when they materialize, embrace the opportunity to test and optimize our existing controls and processes. Our team knows we can\u2019t succeed on our own; while we are accountable for driving a robust security program, we also educate, enable, and empower people across the company to protect Intercom\u2019s ability to <\/span><a href=\"https:\/\/www.intercom.com\/blog\/ship-fast-safe-learn-from-production\/\"><span style=\"font-weight: 400;\">move fast, securely<\/span><\/a><span style=\"font-weight: 400;\">. Everybody at Intercom is responsible for factoring security into our day-to-day decisions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like most Internet-facing web properties, we were hit by the <\/span><a href=\"https:\/\/www.wired.com\/story\/log4j-flaw-hacking-internet\/\"><span style=\"font-weight: 400;\">log4j incident<\/span><\/a><span style=\"font-weight: 400;\"> in December 2021, which we managed to <\/span><a href=\"https:\/\/www.intercomstatus.com\/incidents\/ss5hp81rhv1l\"><span style=\"font-weight: 400;\">contain and mitigate efficiently<\/span><\/a><span style=\"font-weight: 400;\">. We ran an <\/span><a href=\"https:\/\/www.intercom.com\/blog\/incident-reviews\/\"><span style=\"font-weight: 400;\">incident review<\/span><\/a><span style=\"font-weight: 400;\">, drew important lessons, and took the opportunity to refine our security incident response process and improve our internal supply chain related security controls.\u00a0<\/span><\/p>\n<h2 id=\"overcoming-the-infosec-skills-shortage-by-cultivating-intercom-talent\"><span style=\"font-weight: 400;\">Overcoming the InfoSec skills shortage by cultivating Intercom talent<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Being part of Intercom\u2019s R&amp;D organization also has other advantages. We\u2019ve all heard about the InfoSec industry skill shortage. The tech industry is constantly searching for its unicorn senior 10x developer and InfoSec is no different.<\/span><\/p>\n<blockquote class=\"pullquote-style-one\"><p>\u201cTo protect Intercom as a whole, understanding the product, its underlying infrastructure, and how our customers use or misuse it is key\u201d<\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Intercom\u2019s InfoSec team, while always on the lookout for great specialized talent, has taken the alternative approach of investing in internal transfers, early. To protect Intercom as a whole, understanding the product, its underlying infrastructure, and how our customers use or misuse it is key. As a result, the team has taken the approach of internally selecting and onboarding product, systems, and IT engineers, as well as security and compliance TPMs with extensive knowledge of Intercom that they can learn to apply to its security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the help of experienced InfoSec leaders and managers, Intercom\u2019s internal transfers leverage their expertise and growth mindsets to navigate the often daunting InfoSec learning curve. As a result, new team members drive impact quickly through cross-pollination and the strong relationships they maintain with their former teams.<\/span><\/p>\n<h2 id=\"evolving-security-landscape\"><span style=\"font-weight: 400;\">Evolving security landscape<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As we build the future of customer communications, grow the Intercom team and onboard larger and larger customers, Intercom&#8217;s risk tolerance and threat landscape continue to evolve. In recent months, we&#8217;ve ramped up our efforts to roll out a device trust infrastructure to further secure Intercomrades&#8217; access to key systems, and built security and privacy building blocks within the product to enable a robust customer data lifecycle.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There will be many more challenges ahead. As Intercom dreams big and delivers more value to customers, the InfoSec team will strive to continue fostering and safeguarding customers\u2019 trust in how Intercom stores, processes, and manages their data.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Questions? Reach out to a member of our Sales team for more details, or take a look at our <\/span><a href=\"https:\/\/www.intercom.com\/blog\/security\"><span style=\"font-weight: 400;\">security page<\/span><\/a><span style=\"font-weight: 400;\"> on the Intercom website.<\/span><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0We\u2019re committed to meeting the highest standards of security to protect our customers\u2019 trust and love for our product. Here&#8217;s how we do it.<\/p>\n","protected":false},"author":197,"featured_media":26920,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"category":[5],"tags":[25000],"coauthors":[621],"class_list":["post-26919","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product-and-design","tag-intercom-for-enterprise"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security at Intercom: How our InfoSec team protects our customers\u2019 data<\/title>\n<meta name=\"description\" content=\"\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security at Intercom: How our InfoSec team protects our customers\u2019 data and trust\" \/>\n<meta property=\"og:description\" content=\"\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Intercom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/intercominc\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-22T17:44:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-14T12:40:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/02\/1-intercom-for-enterprise@1x.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"843\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thibault Candebat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@intercom\" \/>\n<meta name=\"twitter:site\" content=\"@intercom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thibault Candebat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/\"},\"author\":{\"name\":\"Thibault Candebat\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/person\\\/39d17aa16bdc21c4445638db5efeac02\"},\"headline\":\"Security at Intercom: How our InfoSec team protects our customers\u2019 data and trust\",\"datePublished\":\"2022-02-22T17:44:31+00:00\",\"dateModified\":\"2022-03-14T12:40:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/\"},\"wordCount\":1350,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/1-intercom-for-enterprise@1x.jpg\",\"keywords\":[\"intercom for enterprise\"],\"articleSection\":[\"Product &amp; Design\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/\",\"name\":\"Security at Intercom: How our InfoSec team protects our customers\u2019 data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/1-intercom-for-enterprise@1x.jpg\",\"datePublished\":\"2022-02-22T17:44:31+00:00\",\"dateModified\":\"2022-03-14T12:40:23+00:00\",\"description\":\"\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/intercom-for-enterprise-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/1-intercom-for-enterprise@1x.jpg\",\"contentUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/1-intercom-for-enterprise@1x.jpg\",\"width\":1800,\"height\":843,\"caption\":\"intercom-for-enterprise\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/\",\"name\":\"The Intercom Blog\",\"description\":\"Articles and Podcasts on Customer Service, AI and Automation, Product, and more\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\",\"name\":\"The Intercom Blog\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Intercom-logo-sq-black-trans.png\",\"contentUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Intercom-logo-sq-black-trans.png\",\"width\":1000,\"height\":1000,\"caption\":\"The Intercom Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/intercominc\",\"https:\\\/\\\/x.com\\\/intercom\",\"https:\\\/\\\/www.instagram.com\\\/intercom\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2491343\",\"https:\\\/\\\/www.pinterest.ie\\\/intercom\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJG0MvLP03kyzzAkD-w98aQ\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Intercom_(company)\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/person\\\/39d17aa16bdc21c4445638db5efeac02\",\"name\":\"Thibault Candebat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4071c90c7eb6dd3787002eac071684a98b00cf0f4d7cb2cc825a5561efa3562b?s=96&d=mm&r=pgee6811a036c1dbbf0b927dfa6b44ae9b\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4071c90c7eb6dd3787002eac071684a98b00cf0f4d7cb2cc825a5561efa3562b?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4071c90c7eb6dd3787002eac071684a98b00cf0f4d7cb2cc825a5561efa3562b?s=96&d=mm&r=pg\",\"caption\":\"Thibault Candebat\"},\"description\":\"Thibault Candebat leads Information Security at Intercom and writes frequently on these topics.\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/author\\\/thibault\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security at Intercom: How our InfoSec team protects our customers\u2019 data","description":"\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/","og_locale":"en_US","og_type":"article","og_title":"Security at Intercom: How our InfoSec team protects our customers\u2019 data and trust","og_description":"\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0","og_url":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/","og_site_name":"The Intercom Blog","article_publisher":"https:\/\/www.facebook.com\/intercominc","article_published_time":"2022-02-22T17:44:31+00:00","article_modified_time":"2022-03-14T12:40:23+00:00","og_image":[{"width":1800,"height":843,"url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/02\/1-intercom-for-enterprise@1x.jpg","type":"image\/jpeg"}],"author":"Thibault Candebat","twitter_card":"summary_large_image","twitter_creator":"@intercom","twitter_site":"@intercom","twitter_misc":{"Written by":"Thibault Candebat","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/#article","isPartOf":{"@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/"},"author":{"name":"Thibault Candebat","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/person\/39d17aa16bdc21c4445638db5efeac02"},"headline":"Security at Intercom: How our InfoSec team protects our customers\u2019 data and trust","datePublished":"2022-02-22T17:44:31+00:00","dateModified":"2022-03-14T12:40:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/"},"wordCount":1350,"publisher":{"@id":"https:\/\/www.intercom.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/02\/1-intercom-for-enterprise@1x.jpg","keywords":["intercom for enterprise"],"articleSection":["Product &amp; Design"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/","url":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/","name":"Security at Intercom: How our InfoSec team protects our customers\u2019 data","isPartOf":{"@id":"https:\/\/www.intercom.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/#primaryimage"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/02\/1-intercom-for-enterprise@1x.jpg","datePublished":"2022-02-22T17:44:31+00:00","dateModified":"2022-03-14T12:40:23+00:00","description":"\u200b\u200bAt Intercom, we think deeply about how to deliver the safest, most secure experience possible for our customers and their customers.\u00a0","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/#primaryimage","url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/02\/1-intercom-for-enterprise@1x.jpg","contentUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/02\/1-intercom-for-enterprise@1x.jpg","width":1800,"height":843,"caption":"intercom-for-enterprise"},{"@type":"WebSite","@id":"https:\/\/www.intercom.com\/blog\/#website","url":"https:\/\/www.intercom.com\/blog\/","name":"The Intercom Blog","description":"Articles and Podcasts on Customer Service, AI and Automation, Product, and more","publisher":{"@id":"https:\/\/www.intercom.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intercom.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.intercom.com\/blog\/#organization","name":"The Intercom Blog","url":"https:\/\/www.intercom.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2019\/08\/Intercom-logo-sq-black-trans.png","contentUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2019\/08\/Intercom-logo-sq-black-trans.png","width":1000,"height":1000,"caption":"The Intercom Blog"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/intercominc","https:\/\/x.com\/intercom","https:\/\/www.instagram.com\/intercom\/","https:\/\/www.linkedin.com\/company\/2491343","https:\/\/www.pinterest.ie\/intercom\/","https:\/\/www.youtube.com\/channel\/UCJG0MvLP03kyzzAkD-w98aQ","https:\/\/en.wikipedia.org\/wiki\/Intercom_(company)"]},{"@type":"Person","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/person\/39d17aa16bdc21c4445638db5efeac02","name":"Thibault Candebat","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4071c90c7eb6dd3787002eac071684a98b00cf0f4d7cb2cc825a5561efa3562b?s=96&d=mm&r=pgee6811a036c1dbbf0b927dfa6b44ae9b","url":"https:\/\/secure.gravatar.com\/avatar\/4071c90c7eb6dd3787002eac071684a98b00cf0f4d7cb2cc825a5561efa3562b?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4071c90c7eb6dd3787002eac071684a98b00cf0f4d7cb2cc825a5561efa3562b?s=96&d=mm&r=pg","caption":"Thibault Candebat"},"description":"Thibault Candebat leads Information Security at Intercom and writes frequently on these topics.","url":"https:\/\/www.intercom.com\/blog\/author\/thibault\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/02\/1-intercom-for-enterprise@1x.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts\/26919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/users\/197"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/comments?post=26919"}],"version-history":[{"count":0,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts\/26919\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/media\/26920"}],"wp:attachment":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/media?parent=26919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/category?post=26919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/tags?post=26919"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/coauthors?post=26919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}