Your data is secured in your own data warehouse on Amazon Web Services (AWS), ensuring your data is never commingled.
We train our AI models on queries to accurately retrieve data, never the data itself to keep your data safe.
We NEVER share your data with OpenAI or any other publicly available API, your data never leaves your warehouse.
We encrypt data transfers in to your dedicated warehouse end-to-end and require two-factor authentication.
From a dedicated data warehouse to the ability to hash your PII data, our commitment to security keeps your data secure without extra expense or maintenance. Furthermore, access controls like two-factor authentication, fine-grained permission controls, and IP restricted access means your data is kept at the highest level of confidentiality.
We never co-mingle data. Safely retain your own data in your own dedicated data warehouse without any extra expense or maintenance. Already have a data warehouse and want to keep using it? No problem. Enterprise plans have the option to use your own data warehouse.
We host our product infrastructure on AWS. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems, and each other. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications.
The authorization model is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set.
For customers that have access to PII data, passwords are not stored since we rely on Google or Microsoft sign-in for two-factor authentication. We have implemented technologies to ensure that stored data is encrypted at rest.
We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services.
Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules.
We maintain and regularly test disaster recovery plans to help ensure availability of information following interruption to, or failure of, critical business processes. Our platform is designed to ensure redundancy and seamless failover. The server instances that support the products are also architected with a goal to prevent single points of failure.
Penetration tests are performed against the application layers and infrastructure layers of the CorralData technology stack on an ongoing basis. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios.
"Sharing access, passwords, and dashboards across agencies, vendors, and employees used to be a massive headache. With CorralData, everyone has access to only the data they need to do their jobs."
We're excited to help your company become more data-driven.
Enjoy seamless data integration, AI reporting, collaboration tools, and robust security without coding or upfront costs. No credit card required.
We use AI to help organizations become data driven overnight without a single $ of investment upfront.
The instant our team began using CorralData, everything clicked. It’s seamless to onboard, user-friendly, and very self-serviceable.
Head of Brand