Jitterbit Harmony Platform Security


Jitterbit is vigilant at applying safe and secure integration processes. We use strict security measures to protect our customers’ valuable information and constantly evaluate and improve our systems and processes to keep abreast of the latest security demands.


Security & Architecture White Paper

Review the details of Jitterbit’s logical, physical, and organizational security.

Secure Page

Security Features

See a summary of security features for the Jitterbit Harmony cloud, data centers, and network.


Password Controls

Learn about how Jitterbit controls access to your organization via administration through the Management Console.


Privacy Policy

Gain awareness of what personal data Jitterbit collects and how it is used.


Jitterbit Trust Site

Check real-time information on Jitterbit system performance through our Trust site. You can also subscribe to updates to receive notifications by email, text, or webhook.


Harmony API Security

Learn to apply various levels of security for use with Jitterbit’s Harmony API platform.


Jitterbit’s Harmony platform surpasses the requirements issued by the General Data Protection Regulation (GDPR) and meets new requirements for permission to share any data collected from citizens of and residents in the EU, as well as access to and the ability to control and delete their data.

Enhanced Security Compliance

SOC 1 and SOC 1 - Certification Logos - Jitterbit Security

SOC1 Type I & II, SOC2 Type I & II security compliance, validated by an independent third-party security agency.

Get GDPR Ready - Tile - Jitterbit Security

Maintain GDPR compliance as you connect systems and applications that store your customers’ data.

HIPAA Compliance - Blue Certification Logo - Jitterbit Security

HIPAA Compliance keeps protected health information (PHI) completely secure and accessible only to properly credentialed users.

ISO 27001 A-lign Certifice - Certification Logo - Jitterbit Security

ISO 27001 certification is an international standard that covers a system lifecycle security management along with cloud-specific information security controls.

Read more about our comprehensive security compliance and policies here.

View Security Policies

Security Partners by Type



KnowBe4 is a provider of cyber security solutions, cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology.


Wiz.io delivers automated security and compliance controls through automation of configuration compliance, host intrusion detection, and incident resolution for AWS customers to keep their cloud workloads secure.

Tenable Logo

Tenable.io, the world’s first Cyber Exposure platform, arms Security with the visibility to see their entire cyber attack surface at all times (from IT to Cloud to IoT to OT) and arms the CISO, C-suite and Board of Directors with the insight to focus on the issues which matter most and make better strategic decisions.


A-lign Logo

A-LIGN is a security and compliance solutions provider. They specialize in helping businesses across a variety of industries navigate the scope and complexity of their specific audit and security assessment needs.

TW Security Logo

TW Security provides a practical approach to information security, adhering to the highest ethical standards of behavior—the code of ethics for a CISSP includes acting honorably, honestly, justly, responsibly, and legally.

Core Compliance Logo

Core Compliance provides ISO certification consulting expertise to all types of organizations. Our consultants simplify the often confusing ISO certification process in creating ISO compliant management systems.

Security Tooling

GitHub Logo

Millions of teams trust GitHub to keep their work safe. Our team of experts goes beyond industry standards to secure our platform. And builds features that help you do the same.

TrustArc Logo

TrustArc powers privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

Snyk Logo

The Snyk platform quickly finds and fixes security issues in proprietary code, open source dependencies, container images, and cloud infrastructure so businesses can build security directly into their continuous development process.