Data Privacy. Security. Compliance.
These matter to you. And they are imperative to us.
2020欧洲杯时间安排Customers turn to Splunk to understand and improve their security posture. We practice what we preach. We are dedicated to keeping your data secure and private. We are committed to adhering to global and industry compliance initiatives. We prepare for incidents, and we help you prepare, respond to and remediate the consequences of any incidents.
Security by Design
2020欧洲杯时间安排Security and compliance are top-of-mind throughout our development process. Our products are designed to meet your data handling needs, with access controls, auditability, assurance of data integrity, and integration with enterprise single-sign on solutions.
Training and Internal Policies
It’s not enough to build secure products. Every person at an organization is responsible for making sure data is secure. We train employees on policies and procedures for secure data handling, and use physical and procedural safeguards to help keep our facilities and equipment secure.
Meeting International and Industry Standards
fx-adviser.complies with both industry and international security standards.This includes participating in rigorous third-party audits that verify security controls for our cloud solutions.
Granular Access and Audit Controls
2020欧洲杯时间安排Role-based access and audit controls allow you to control and monitor the actions your Splunk users can take, and what data, tools and dashboards they can access.
- Learn more about and .
- You can build your own roles to map to your organization’s data access policies for different classes of users. You can also map Lightweight Directory Access Protocol () or Security Assertion Markup Language () groups to different roles.
Security Certifications and Attestations (SOC2 Type II and ISO 27001)
Splunk Cloud maintains a comprehensive security program designed to protect your data’s confidentiality, integrity, and availability in accordance with the highest industry standards. Splunk Cloud has been certified by independent third-party auditors to meet SOC2 Type II and ISO 27001 security standards.
Still Have Questions?