We Value Your Data

Security

Data security at scale

Every decision we make is rooted in our values - humility and responsibility. From our processes, behaviors and down to every level of infrastructure, we make no compromises when it comes to our customers’ data security.

For more details concerning our security practices and procedures, please see our Statement of Treasure Data’s Security Practices.

Read more about our point of view on security.
See the following post from our Co-founder & Executive Chairman

Read post

Data - driven marketing comes with security and data privacy responsibilities

Security is the foundation for data privacy. Our technology helps the largest brands in the world harness the potential of their customer and prospect data in the securest way possible. Customers use enterprise Customer Data Platform to know, engage and sell to their buyers, while maximizing returns on marketing investments. We know the value of this capability and nothing should jeopardize it, including the loss, theft or corruption of data.

Additionally, care needs to be taken to protect who it represents– your customers. That’s why Treasure Data is embracing opportunities to help you gain your customers’ trust. See how our enterprise customer data platform (CDP) can assist with data privacy regulations, including the General Data Protection Regulations (GDPR) and California Consumer Privacy Act (CCPA)

Stay Informed

We are keeping data safe for some of the largest companies in the world

Treasure Data makes your security processes for customer data manageable, no matter the scale. Some of the largest companies in the world rely on our security profile every day to keep their customers’ personally identifiable information (PII) safe. They also use our advanced administration capabilities to enable their global teams and keep them privacy-regulation compliant.

Advanced policy-based access control that enables administrators to assign and manage user permissions at a granular level

Flexible policies to manage permissions at every level– by region, by organization, by role and more

Integration with enterprise authentication services to securely provide identity federation using SAML protocol

Premium audit logs to view, filter and query unlimited number of events for in-platform activity tracking

Multiple accounts for development and production

Our Security Profile

Treasure Data provides the following page where you can make a request for any compliance related materials.

ISO/IEC 27001:2013 Certified

Learn More

Successful completion of SOC 2 Type 2 audit by accredited external auditors

Learn More

FISC: Financial Industry Information Systems

Learn More

24/7 network monitoring
Encryption in transit & at rest
A fully redundant platform
Our platform is built in a tiered environment protecting the application and databases from internet - based attacks
The Amazon Web Services (AWS) environment is accredited to: ISO/IEC 27001:2013, SSAE 16 SOC 1 , SOC 2 Type 2, PCI Level 1, FISMA Moderate, Sarbanes - Oxley (SOX)

Learn More

PrivacyMark Certified

Learn More

Shared Security Model

Treasure Data is built on Amazon Web Services (AWS). We understand the shared security model and engage accredited external auditors to ensure that our processes and controls, along with those of our service providers, meet established criteria for security, confidentiality, and availability.