Intelligent Document Processing and Workflow Automation
Digitise, store, automate, and unlock the power of your data
Eliminate paper at your front door. Whether you plan on going back to the office, remaining virtual, or a combination, freeing yourself from receiving and distributing physical mail is critical to moving forward.
Security and compliance
We take security seriously. That’s why 95% of Fortune 1000 companies trust Iron Mountain with their critical and sensitive records. We have been securing sensitive data for 70+ years and provide services across a wide range of industries in more than 60 countries.
You can rest easy knowing that your information is safe in our end-to-end solution—from working with you on logistics for digitising your documents at our scanning centers to auto-routing your digital information to the intended recipient and disposing of your paper documents in the manner you request (securely storing, shredding, or returning it to you).
InSight leverages the National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) as its enterprise security framework and complies with industry standards, including (but not limited to):
- Soc 2 Type II
*available through Professional Services
Frequently asked questions
Browse these frequently asked questions and contact us if you’d like to ask your own.
Who can access my documents?
Iron Mountain’s Implementation team meets with your organisation to learn how your organisation wishes to handle documents: by department, floor, individual, etc.
Iron Mountain then sets up your users, user groups and data security rules to ensure that the proper people have access to your information. Post implementation, your administrator users will be able to update your user groups and maintain users.
Learn more about privacy and data protection at Iron Mountain.
How does Iron Mountain ensure that only the right users access information?
Data security is paramount to any organisation and Iron Mountain makes this easy with metadata based security capabilities. Metadata security rules can be set up by your administrator and assigned to users either at the individual or user group level. This ensures that users are only accessing information they should.
Can I use InSight for my documents that have been previously digitised?
Yes, you can easily ingest your digital documents and add index data to help centralise your information. Ingestion from the following repositories is also supported: Iron Mountain Connect via Image on Demand (IOD), Amazon® Web Services (AWS), Google Cloud, Enterprise Content Management (ECM) (including but not limited to SharePoint, Alfresco and OpenText), Google Drive, Drop Box, Network File Systems (NFS), as well as data from tape, photos, audio and videos.
What happens to our physical documents that are digitised by Iron Mountain?
You are able to select from several disposition options for your physical documents:
- Your physical documents can be returned to you
- Your physical documents can be stored in an Iron Mountain record centre
- Your physical can be securely shredded
Are these SaaS solutions scalable?
Is my data recoverable in the event of a disaster?
Why should I choose Iron Mountain?
Unlike other offerings, Iron Mountain provides an auditable chain of custody across physical and digital documents. We take security seriously, that is why 95% of the Fortune 1,000 companies trust Iron Mountain with their critical and sensitive records. We have been securing sensitive data for 70+ years across a wide range of industries in over 60 countries. You can rest easy knowing that your information is safe in our end-to-end solution - from digitisation at our scanning centres to auto-routing your documents to the intended recipient and disposing of your physical documents in the manner you request (securely storing, shredding, or returning them to you).