We Value Your Data

Security

Data security at scale

Every decision we make is rooted in our values - humility and responsibility. From our processes, behaviors and down to every level of infrastructure, we make no compromises when it comes to our customers’ data security.

For more details concerning our security practices and procedures, please see our Statement of Treasure Data’s Security Practices. Click here.

Read more about our point of view on security.
欧洲杯投注app See the following post from the Vice President & General Manager of Data Business

Data - driven marketing comes with security and data privacy responsibilities

欧洲杯投注appSecurity is the foundation for data privacy. Our technology helps the largest brands in the world harness the potential of their customer and prospect data in the securest way possible. Customers use enterprise Customer Data Platform to know, engage and sell to their buyers, while maximizing returns on marketing investments. We know the value of this capability and nothing should jeopardize it, including the loss, theft or corruption of data.

Additionally, care needs to be taken to protect who it represents– your customers. That’s why Arm Treasure Data is embracing opportunities to help you gain your customers’ trust. See how our enterprise customer data platform (CDP) can assist with data privacy regulations, including the General Data Protection Regulations (GDPR) and California Consumer Privacy Act (CCPA)

Stay Informed

We are keeping data safe for some of the largest companies in the world

欧洲杯投注appArm Treasure Data makes your security processes for customer data manageable, no matter the scale. Some of the largest companies in the world rely on our security profile every day to keep their customers’ personally identifiable information (PII) safe. They also use our advanced administration capabilities to enable their global teams and keep them privacy-regulation compliant.

欧洲杯投注appAdvanced policy-based access control that enables administrators to assign and manage user permissions at a granular level

欧洲杯投注appFlexible policies to manage permissions at every level– by region, by organization, by role and more

欧洲杯投注appIntegration with enterprise authentication services to securely provide identity federation using SAML protocol

Premium audit logs to view, filter and query unlimited number of events for in-platform activity tracking

欧洲杯投注appMultiple accounts for development and production

Our Security Profile

ISO/IEC 27001:2013 Certified

Learn More

Successful completion of SOC 2 Type 2 audit by accredited 
external auditors

Learn More

EU - U.S. and Swiss - U.S. Privacy Shield certified

FISC: Financial Industry Information Systems

Learn More

24/7 network monitoring
Encryption in transit and at rest
A fully redundant platform
Our platform is built in a tiered environment protecting the application and databases from internet - based attacks
The IDC Frontier (IDCF) Data Center used is accredited to:
 ISO/IEC 27001:2013, ISO/IEC 27017:2015 (JIP - ISMS517 - 1.0)

The Amazon Web Services (AWS) environment is accredited to: ISO/IEC 27001:2013, SSAE 16 SOC 1 , SOC 2 Type 2, PCI Level 1, FISMA Moderate, Sarbanes - Oxley (SOX)

Shared Security Model

Arm Treasure Data is built on Amazon Web Services (AWS). We understand the shared security model and engage accredited external auditors to ensure that our processes and controls, along with those of our service providers, meet established criteria for security, confidentiality, and availability.