Evolved Inclusion shut down on July 30, 2022. Read more the blog post to learn more.
Secure by Design.
Our security practices are guided by the belief that your data should be safe, secure, and yours alone. Protecting your data is our top priority. Modern security is built into the platform from the ground up.
Encrypted
Evolved Inclusion implements end-to-end encryption. Your data is encrypted at rest using 256-bit AES-GCM encryption. Data is encrypted in transit using TLSv1.2 or better, even inside Evolved’s private network.
Private
Your data belongs to you. Your data is never used, sold, traded, or made available to anyone but you.
Controlled
Access to Evolved Inclusion servers is strictly controlled with multi-factor authentication. Internal systems are not visible to the internet, and sensitive data is encrypted. Data is stored entirely within U.S. data centers. All system access is logged.
Monitored
Evolved Inclusion is deployed in a distributed, fault-tolerant architecture. Services are monitored 24/7 for operational incidents. Intrusion detection monitors for any signs of unusual activity.
In order to give you the best experience, we and third party services we use may use cookies and other similar technologies to analyze usage and optimize our site, personalize your content, and keep the this site secure. Learn more in ourPrivacy Policy.