Data security is our highest priority
Security and compliance is a cornerstone of our fully managed data integration philosophy. Fivetran guards customer data, including personally identifiable information (PII) through a rigorous combination of features, capabilities and processes.
A dedicated security team
Drives rigorous internal processes and regulatory certifications.
Detailed user action logging. Fivetran never accesses your data unless you authorize it through explicit grants.
Protect sensitive information with blocking & hashing
Ensure that only the data you want is replicated. You have the option to block particular fields or hash them if you’d like the data in your destination, but not in cleartext. Along the way, data is encrypted in transit with TLS 1.2+ and at rest with AES 256-bit encryption keys.
Track what’s done with your data
We offer details on every step of the process from extract to load, which can be found in the UI or exported to your analytics destination or log monitoring tool of choice for auditing. For premium plans, forward events to external log.
Authorize data according to profiles
Standard role-based access control includes SSO/SAML to configure single sign-on using Okta, OneLogin, PingOne, Azure AD or Google Workspace. Custom roles, available in premium plans, ensure that integrations and functionality can only be accessed by the appropriate persons.
Data is processed, not persisted
Fivetran only retains data as long as is needed to successfully sync your data. In the majority of cases, data is retained for less than 24 hours.
Senior Vice President of Product
Industry Leading Compliance