Security & Compliance

Your data's security is our top priority

We know how important it is to keep your customer data safe & secure. That's why we've gone above and beyond to ensure it stays that way.

Contact security team
Single Sign-on (SSO) enables Correlated customers to add organizational-level security to ensure authorized access to the platform.
We’ve undertaken a rigorous process to ensure we are SOC2 Type II certified, giving you peace of mind as we secure, monitor, and process your data.
All data transferred to and stored within Correlated systems are encrypted in transit (using TLS version 1.2 or greater) and at rest (using AES256).
using product data for expansion and cross sell opportunities

Control access within your organization

Product & application security

All data transferred to and stored within Correlated systems are encrypted in transit and at rest. Correlated additionally encrypts any sensitive information kept within database systems using AES256, which uses a different encryption key that is regularly rotated.

Correlated maintains audit logs for all activity, from the operating system level up to the application, and has automated systems in place to detect illicit activity. Yearly third-party security experts perform detailed penetration tests on our application and infrastructure.

using product data for expansion and cross sell opportunities

Secure today and in the future

Network security

Correlated services and data are hosted in Google Cloud Platform. Correlated infrastructure has been architected with disaster recovery in mind. All infrastructure and data services are spread across availability zones and will continue to work through data center failures.

All servers and services are hosted within Correlated's virtual private cloud (VPC) with strict network access control lists (ACLs) that prevent unauthorized access within the network. Correlated uses third party security tools that continuously scan for vulnerabilities, malware, and secrets being stored without using the encryption procedures detailed above.

using product data for expansion and cross sell opportunities

Going the extra mile

Personnel security

All employees complete security and awareness training. Correlated maintains and frequently updates security policies that cover a wide range of topics, which are shared with all employees.

All employees are vetted before hiring including background checks in accordance with local laws, employment verification, and criminal checks for US employees.

Wondering how to model your data to support Correlated?

Read more about our suggested PLG Data Model. 

Ready to take your product led strategy to the next level?

Request demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.