Black Friday Sale: New subscriptions 50% off one year when purchased by 12/1
Activate Now

Our security program keeps you informed and safe using Telemetry.

Our security follows three themes:

1.
Security leaders icon

Telemetry will lead our peers in cloud and product security.

2.
Security standards icon

Telemetry will meet all customer requirements for cloud security and exceed requirements for industry security standards and certifications.

3.
Security transparency icon

Telemetry will remain open and transparent about our programs, processes, and metrics.

Certifications

SOC 2 Compliant

Telemetry is SOC 2 Type 2 Compliant. This means our company has been certified by an independent auditor to be secure and resilient.

Practices

Security practices icon

Security starts with our team. Our team of engineers, product managers, and quality assurance personnel continually focus not only on the security of our products, but also the security of each of our environments.

Focus Areas

Product security
Product security icon

Security of our product and platform

Ecosystem security
Ecosystem security icon

Security of our cloud environments and connection points

Security intelligence
Security intelligence icon

Anticipating, detecting and responding to security incidents

Corporate security
Corporate security icon

Internal security with respect to our internal network and infrastructure

Development
Development icon

Security built into the software development processes

Awareness and training
Awareness and training icon

Ensuring our employees and partners know how to work securely

Environmental and Network Security

Security architecture icon
Building security into our network architecture

Telemetry practices a layered approach to security for our networks. We implement controls at each layer of our cloud environments, dividing our infrastructure by zones, environments, and services. We have zone restrictions in place that include limiting office/staff, customer data, and network traffic. We also have environment separation to limit connectivity between production and non-production environments, and production data is not replicated outside of production environments. Access into production networks and services is only possible from within those same networks – e.g. only a production service can access another production service.

ZeroTrust
Zero trust icon

Never Trust. Verify. Access to all systems and resources (Corporate, Development, Infrastructure, Data, Networking) are all based on positive verification and the correct ability to access such resources regardless of users’ role, location, status, etc.

Human focused penetration testing
Human focused penetration testing icon

Telemetry engages with security partners to proactively probe our applications and infrastructure to determine weaknesses and evaluate our security posture.

Encryption
Encryption icon

All data is encrypted in transit and at rest. No exceptions. We do not store any unnecessary data such as payment methods.

Constant monitoring
Security monitoring icon

All exposed surfaces, internal networks, servers and contains are constantly scanned and evaluated as new threats emerge.