Security & Compliance

Trust Center

Privacy and security are of the utmost importance. Please find comprehensive information about our commitment to protecting your data below.

globe representing the data intelligence platform's trust center

Our dedication to building trust

We protect your information with strict security measures and adhere to top privacy standards.

How we protect your data

cloud data icon

Cloud architecture

Our cloud architecture is designed to segregate and restrict data access based on the customer and provides role-based access privileges, all controlled on a customer-specific level.

file security icon

Robust encryption

We employ strong encryption protocols to secure your data, both in transit and at rest, ensuring that it remains protected from unauthorized access.

blue Bezier Icon for Actian

Processing integrity

We maintain the consistency, accuracy, and reliability of our customers’ data throughout its lifecycle, and we do not access or manage it.

connectivity icon

Access controls

We implement strict access controls, limiting data access only to authorized personnel who have a legitimate need to interact with the data.

blue Actian support tools icon

Regular audits

We conduct regular audits and assessments to monitor our systems, identify vulnerabilities, and maintain the highest level of data security.

blue users icon for actian

Employee training

Our employees undergo comprehensive security training to ensure they understand their responsibilities and maintain a strong culture.

monitoring icon

Data privacy policies

We have clear and transparent data privacy policies in place, outlining how we handle and protect your data, as well as your rights as a data subject.

shield check mark icon

Security

We perform regular application security (AppSec) and penetration test (PenTest) assessments by an independent security firm in order to bolster the security of our applications and information systems.

Continuity icon

Availability

Our systems are constantly and easily accessible 24-hours a day, 7-days a week, to meet all customer requirements.

blue check logo for Actian

Confidentiality

We have a dedicated information security team, and we also provide our clients with configurable Single-sign-on (SSO) and multi-factor authentication (MFA) options.

FAQ

strong encryption for data in transit and at rest, strict role-based access controls, segregated cloud architecture, regular security audits and penetration testing, and comprehensive employee security training. We maintain 24/7 system availability, implement configurable Single Sign-On (SSO) and multi-factor authentication (MFA), and ensure processing integrity throughout the data lifecycle. Actian’s commitment to data protection is backed by SOC 2 Type II compliance, ISO/IEC 27001:2022 certification, GDPR adherence, and transparent data privacy policies that outline how we handle and protect your information.

Encryption transforms readable data into a coded format using cryptographic algorithms, making it unreadable to unauthorized users who don’t possess the decryption key. Data in transit (between locations) and data at rest (in databases or systems) both require protection against interception, theft, or unauthorized access. Without robust encryption, sensitive information remains vulnerable to cyberattacks, data breaches, and regulatory violations. Actian employs strong encryption protocols to secure customer data both in transit and at rest, ensuring that it remains protected from unauthorized access at all times.

Regular security audits and penetration testing proactively identify vulnerabilities, misconfigurations, and security gaps before malicious actors can exploit them. Penetration tests simulate real-world attacks to assess how systems withstand sophisticated threats, while audits ensure compliance with security policies and standards. Without ongoing assessments, organizations remain unaware of evolving security risks and may fail to meet regulatory requirements. Actian conducts regular application security (AppSec) and penetration testing (PenTest) assessments with independent security firms to continuously strengthen the security of our applications and information systems.

Even the most sophisticated security technologies can be undermined by human error, as employees often represent the first line of defense against phishing, social engineering, and insider threats. Comprehensive security training ensures that staff understand data-handling protocols, recognize security risks, and follow best practices to protect sensitive information. Organizations without regular training programs experience higher rates of security incidents caused by employee mistakes.

Role-based access control (RBAC) limits data access to only those individuals who need it to perform their job functions, following the principle of least privilege. This approach reduces the risk of unauthorized access, insider threats, and accidental data exposure by ensuring employees can only view or modify data relevant to their roles. Without proper access controls, sensitive information may be exposed to unauthorized personnel, increasing breach risk and compliance violations. Actian implements strict role-based access controls with customer-specific privilege levels, ensuring that data access is segregated and restricted based on legitimate business needs and authorized personnel only.