We Value Your Data

Security

Data security at scale

Every decision we make is rooted in our values - humility and responsibility. From our processes, behaviors and down to every level of infrastructure, we make no compromises when it comes to our customers’ data security.

For more details concerning our security practices and procedures, please see our Statement of Treasure Data’s Security Practices. Click here.

Read more about our point of view on security.
See the following post from the Vice President & General Manager of Data Business

Learn More

Data - driven marketing comes with security and data privacy responsibilities

Security is the foundation for data privacy. Our technology helps the largest brands in the world harness the potential of their customer and prospect data in the securest way possible. Customers use enterprise Customer Data Platform to know, engage and sell to their buyers, while maximizing returns on marketing investments. We know the value of this capability and nothing should jeopardize it, including the loss, theft or corruption of data.

Additionally, care needs to be taken to protect who it represents– your customers. That’s why Arm Treasure Data is embracing opportunities to help you gain your customers’ trust. See how our enterprise customer data platform (CDP) can assist with data privacy and General Data Protection Regulation (GDPR) compliance.

Stay Informed

We are keeping data safe for some of the largest companies in the world

Arm Treasure Data makes your security processes for customer data manageable, no matter the scale. Some of the largest companies in the world rely on our security profile every day to keep their customers’ personally identifiable information (PII) safe. They also use our advanced administration capabilities to enable their global teams and keep them privacy-regulation compliant.

Advanced policy-based access control that enables administrators to assign and manage user permissions at a granular level

Flexible policies to manage permissions at every level– by region, by organization, by role and more

Integration with enterprise authentication services to securely provide identity federation using SAML protocol

Premium audit logs to view, filter and query unlimited number of events for in-platform activity tracking

Multiple accounts for development and production

Our Security Profile

ISO/IEC 27001:2013 Certified

Learn More

Successful completion of SOC 2 Type 2 audit by accredited 
external auditors

Learn More

EU - U.S. and Swiss - U.S. Privacy Shield certified

Learn More

24/7 network monitoring
Encryption in transit and at rest
A fully redundant platform
Our platform is built in a tiered environment protecting the application and databases from internet - based attacks
The IDC Frontier (IDCF) Data Center used is accredited to:
 ISO/IEC 27001:2013, ISO/IEC 27017:2015 (JIP - ISMS517 - 1.0)

Learn More

The Amazon Web Services (AWS) environment is accredited to: ISO/IEC 27001:2013, SSAE 16 SOC 1 , SOC 2 Type 2, PCI Level 1, FISMA Moderate, Sarbanes - Oxley (SOX)

Learn More

Shared Security Model

Arm Treasure Data is built on Amazon Web Services (AWS). We understand the shared security model and engage accredited external auditors to ensure that our processes and controls, along with those of our service providers, meet established criteria for security, confidentiality, and availability.