• Industries
    • Agencies

      Help your clients become data driven faster through seamless reporting and collaboration tools.

    • B2B

      Drive results by keeping teams informed and focused on real-time goals.

    • E-Commerce & DTC

      Turn data into success with complete visibility of every consumer interaction.

    • Fast Casual & QSRs

      Align headquarters and restaurant locations with the metrics that matter.

    • Healthcare

      Make data-driven decisions that enhance patient care and improve your bottom line.

    • Non-Profits & NGOs

      Give everyone access to the metrics and insights that will achieve your mission.

    • Retail

      Easily surface the data you need to increase sales and drive revenue.

    • Self-Storage

      Make data-driven decisions to maximize your occupancy and net effective rates.

  • Features
  • Integrations
  • Pricing
  • Blog

Data security

Enterprise-grade security comes standard

Data security

Enterprise-grade security comes standard

Every client has their own data warehouse

Your data is secured in your own data warehouse on Amazon Web Services (AWS), ensuring your data is never commingled.

We don’t train our models on your data

We train our AI models on queries to accurately retrieve data, never the data itself to keep your data safe.

We don’t share your data with OpenAI

We NEVER share your data with OpenAI or any other publicly available API, your data never leaves your warehouse.

We encrypt and anonymize all data

We encrypt data transfers in to your dedicated warehouse end-to-end and require two-factor authentication.

From a dedicated data warehouse to the ability to hash your PII data, our commitment to security keeps your data secure without extra expense or maintenance. Furthermore, access controls like two-factor authentication, fine-grained permission controls, and IP restricted access means your data is kept at the highest level of confidentiality.

How CorralData keeps your data secure

Dedicated warehouse

We never co-mingle data. Safely retain your own data in your own dedicated data warehouse without any extra expense or maintenance. Already have a data warehouse and want to keep using it? No problem. Enterprise plans have the option to use your own data warehouse.

Physical security

We host our product infrastructure on AWS. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems, and each other. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications.

Authorization

The authorization model is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set.

Two-factor authentication

For customers that have access to PII data, passwords are not stored since we rely on Google or Microsoft sign-in for two-factor authentication. We have implemented technologies to ensure that stored data is encrypted at rest.

Intrusion detection

We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services.

Access controls

Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules.

Disaster recovery

We maintain and regularly test disaster recovery plans to help ensure availability of information following interruption to, or failure of, critical business processes. Our platform is designed to ensure redundancy and seamless failover. The server instances that support the products are also architected with a goal to prevent single points of failure.

Penetration testing

Penetration tests are performed against the application layers and infrastructure layers of the CorralData technology stack on an ongoing basis. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios.

"Sharing access, passwords, and dashboards across agencies, vendors, and employees used to be a massive headache. With CorralData, everyone has access to only the data they need to do their jobs."

Eric Estroff

Sweetgreen

Experience the power of AI-driven data.
Start your 30-day free trial.

This field is for validation purposes and should be left unchanged.