Secure Data Warehousing

We take ample steps to protect your data. Why? Because it’s the right thing to do.

groupdatasecurity_lock-icon-2

5 overarching security principles that guide us

groupdatasecurity_lock-icon-2
groups_b-1

Data Isolation

To retain data purity and security, we isolate your data from the other data sources we work with. No comingling here.

groups_b-2

Strict Access Control

Fewer cooks in the kitchen, the better, right? That’s why we restrict who exactly has access to your data. Only those actively working on your custom data solutions will have access to your data.

groups_b-3

Robust Logging and Access Tracking

It’s one thing to say you restrict access and another to actually track it. Our robust tracking system ensures that we know precisely who has accessed your data and when.

groups_b-4

Column and Row Level Access Restriction

This is where we get down into the nitty-gritty of data security. We go so far as to restrict access down to the column and row level with data.

groupdatasecurity_5-icon

Identifiable Data vs Aggregate/De-Identified Data Policy Distinctions

We clearly define the difference between identifiable data (data that can be traced back to its source) and aggregate or de-identified data (data that has been homogenized into one mass of data and whose parts are no longer traceable back to their source.)

Our tactical approach to data security

check-mark

Most data encrypted at rest; sensitive data always encrypted

This conceals and protects your data, especially your sensitive data, by converting it into a code.

check-mark

Data always encrypted in transit - Transfer Layer Security (TLS)

Think of this as the best possible protection for your data when in transit.

check-mark

Continual compliance with security patches

Security is ongoing for us. We don’t just set it and forget it. We continuously monitor and improve our security.

check-mark

External access only through VPN or IP whitelisting

We only give access to the data to those who should have access to it. Simple and secure.

check-mark

Data Governance Layers

This includes secured programmatic and API access, isolating each data entity, and long-term access and activity log retention.

check-mark

Regularly scheduled and enforced password & encryption key rotation

You won’t find any “password1234” or “computer123” passwords here. In fact, you won’t find any passwords because we securely rotate them.

groupdatasecurity_shield-icon-2

Your data is safe with us. Have more questions? Let's chat.