Jitterbit Harmony Platform Security

Overview

Jitterbit is vigilant at applying safe and secure integration processes. We use strict security measures to protect our customers’ valuable information and constantly evaluate and improve our systems and processes to keep abreast of the latest security demands.

Security & Architecture White Paper

Security & Architecture White Paper

Review the details of Jitterbit’s logical, physical, and organizational security.

Security Features

Security Features

See a summary of security features for the Jitterbit Harmony cloud, data centers, and network.

Password Controls

Password Controls

Learn about how Jitterbit controls access to your organization via administration through the Management Console.

Privacy Policy

Privacy Policy

Gain awareness of what personal data Jitterbit collects and how it is used.

Jitterbit Trust Site

Jitterbit Trust Site

Check real-time information on Jitterbit system performance through our Trust site. You can also subscribe to updates to receive notifications by email, text, or webhook.

Harmony API Security

Harmony API Security

Learn to apply various levels of security for use with Jitterbit’s Harmony API platform.

jitterbit-SOC-compliance

Certifications

Jitterbit’s Harmony platform surpasses the requirements issued by the General Data Protection Regulation (GDPR) and meets new requirements for permission to share any data collected from citizens of and residents in the EU, as well as access to and the ability to control and delete their data.

Enhanced Security Compliance

SOC1 SOC2 certified
SOC1 Type I & II, SOC2 Type I & II security compliance, validated by an independent third-party security agency.

Get GDPR-ready
Maintain GDPR compliance as you connect systems and applications that store your customers’ data.

HIPAA compliance logo
HIPAA Compliance keeps protected health information (PHI) completely secure and accessible only to properly credentialed users.

ISO 27001 Certification
ISO 27001 certification is an international standard that covers a system lifecycle security management along with cloud-specific information security controls.

Security Partners by Type

Perimeter

 

Optiv logo

Optiv is a provider of cyber security solutions, cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology.

 

Lacework logo

Lacework delivers automated security and compliance controls through automation of configuration compliance, host intrusion detection, and incident resolution for AWS customers to keep their cloud workloads secure.

 

Tenable Logo

Tenable.io, the world’s first Cyber Exposure platform, arms Security with the visibility to see their entire cyber attack surface at all times (from IT to Cloud to IoT to OT) and arms the CISO, C-suite and Board of Directors with the insight to focus on the issues which matter most and make better strategic decisions.

Compliance

 

A-Lign logo

A-LIGN is a security and compliance solutions provider. They specialize in helping businesses across a variety of industries navigate the scope and complexity of their specific audit and security assessment needs.

 

TW Security logo

TW Security provides a practical approach to information security, adhering to the highest ethical standards of behavior—the code of ethics for a CISSP includes acting honorably, honestly, justly, responsibly, and legally.

 

Core Compliance

Core Compliance provides ISO certification consulting expertise to all types of organizations. Our consultants simplify the often confusing ISO certification process in creating ISO compliant management systems.

Security Tooling

 

Github Security

Millions of teams trust GitHub to keep their work safe. Our team of experts goes beyond industry standards to secure our platform. And builds features that help you do the same.

 

TrustArc logo

TrustArc powers privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

 

Whitesource Software logo

WhiteSource automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components.