Jitterbit Harmony Platform Security


Jitterbit is vigilant at applying safe and secure integration processes. We use strict security measures to protect our customers’ valuable information and constantly evaluate and improve our systems and processes to keep abreast of the latest security demands.

Security & Architecture White Paper

Security & Architecture White Paper

Review the details of Jitterbit’s logical, physical, and organizational security.

Security Features

Security Features

See a summary of security features for the Jitterbit Harmony cloud, data centers, and network.

Password Controls

Password Controls

Learn about how Jitterbit controls access to your organization via administration through the Management Console.

Privacy Policy

Privacy Policy

Gain awareness of what personal data Jitterbit collects and how it is used.

Jitterbit Trust Site

Jitterbit Trust Site

Check real-time information on Jitterbit system performance through our Trust site. You can also subscribe to updates to receive notifications by email, text, or webhook.

Harmony API Security

Harmony API Security

Learn to apply various levels of security for use with Jitterbit’s Harmony API platform.



Jitterbit’s Harmony platform surpasses the requirements issued by the General Data Protection Regulation (GDPR) and meets new requirements for permission to share any data collected from citizens of and residents in the EU, as well as access to and the ability to control and delete their data.

Enhanced Security Compliance

SOC1 SOC2 certified
SOC1 Type I & II, SOC2 Type I & II security compliance, validated by an independent third-party security agency.

Get GDPR-ready
Maintain GDPR compliance as you connect systems and applications that store your customers’ data.

HIPAA compliance logo
HIPAA Compliance keeps protected health information (PHI) completely secure and accessible only to properly credentialed users.

ISO 27001 Certification
ISO 27001 certification is an international standard that covers a system lifecycle security management along with cloud-specific information security controls.

Security Partners by Type



Optiv logo

Optiv is a provider of cyber security solutions, cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology.


Lacework logo

Lacework delivers automated security and compliance controls through automation of configuration compliance, host intrusion detection, and incident resolution for AWS customers to keep their cloud workloads secure.




A-Lign logo

A-LIGN is a security and compliance solutions provider. They specialize in helping businesses across a variety of industries navigate the scope and complexity of their specific audit and security assessment needs.


TW Security logo

TW Security provides a practical approach to information security, adhering to the highest ethical standards of behavior—the code of ethics for a CISSP includes acting honorably, honestly, justly, responsibly, and legally.



Rapid7 provides a comprehensive security platform and assessment services to help customers better understand their security posture through shared visibility, analytics, and automation that unite teams around challenges and successes of cybersecurity.

Security Tooling


Qualys logo

The Qualys Cloud Platform help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.


TrustArc logo

TrustArc powers privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.


Whitesource Software logo

WhiteSource automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components.