The freedom to choose a level that best supports your business requirements
Customers across the globe trust GoodData with their most sensitive data. We provide the highest level of data security and protection to enhance trust, provide full transparency and enhance governance, risk management and compliance for companies of any size. Your data is safe with GoodData.
Industry standard best practices for data protection in the cloud, including SOC 2 Type II report, ISO 27001:2013 compliance, GDPR compliance and CCPA compliance.
Gold standard for all customers.
Built for enterprise environments with sensitive or regulated data which require additional assurance on security practices, data handling, and implementation.
Available as an extension to Security Shield.
Introducing Enterprise Shield
Best for enterprise environments, includes data security, compliance and assurance features beyond Security Shield:
Managed or Self-Service implementation, according to customer preference
- Managed option features fully controlled secure workspace deployment including ISO 27001:2013-compliant implementation and management by the GoodData Professional Services team
- Self-Service option includes annual security and compliance review of customer Data Product by GoodData Personnel
Access to Platform Events audit log API allowing the customer to load audit events directly to their SIEM and implement real-time monitoring and access reviews
Committed SLAs for patch and vulnerability management
Customer security/risk assessments, reporting, and audits
Heightened monitoring and audit of all GoodData personnel accessing customer data
All Enterprise Shield related controls are covered by GoodData SOC 2 Type II audit
Ingrained in our DNA, tailored to fit your business
Data security, confidentiality, availability, and integrity are vital to our customers’ business operations. Working in partnership with customers and technology providers, GoodData ensures the highest level of security by employing a proactive strategy that combines industry best practices, state-of-the-art technology, and common sense.
We employ a multi-layered approach to protect information, keep up with international compliance standards and best practices, test and adopt new technology, and continuously monitor and improve our applications, systems, and security processes—all while paying close attention to specific regulatory requirements in customer industries and locales.
More details can be found in our fine print.