Harmony Platform Security
Jitterbit employs strict security measures to protect our customers’ critical business processes and valuable information.
Jitterbit’s layered security foundation
Jitterbit is vigilant at applying safe and secure integration processes. We use strict security measures to protect our customers’ valuable information, and constantly evaluate and improve our systems and processes to keep abreast of the latest security demands.
Jitterbit manages the security of the Harmony platform by applying a hybrid framework based on NIST, CISA, CSA, and CERT recommendations. We constantly evaluate and improve our systems and processes to meet or exceed the latest security demands.
This framework is categorized into three key layers: Logical Security, Organizational Security and Physical Security:




Logical Security
Logical security is comprised of all the security measures taken within the Harmony platform. These include the system architecture; major components; Harmony users, organizations, and roles; Harmony environments and access control; Harmony data storage; and Harmony security topologies.

Logical Security
Logical security is comprised of all the security measures taken within the Harmony platform. These include the system architecture; major components; Harmony users, organizations, and roles; Harmony environments and access control; Harmony data storage; and Harmony security topologies.
Global Accreditation & Compliance
The Jitterbit Harmony platform meets the highest global security standards, and has been accredited by or certified to be compliant with the following global standards:










Read more about our comprehensive security compliance and policies here.
View Security PoliciesSecurity Partners


