Built-in platform security and privacy

Customer managed keys

Control the master key to your encryption.

US-only support

Host Fivetran on AWS GovCloud with the option for US only support.

Data encryption

Data, keys, and credentials are encrypted in transit and at rest.

Column blocking and hashing

Fully block data from replicating or hash it to anonymize the data before it enters the destination.

Meet your specific requirements with secure connections and deployment methods

Connect to Fivetran using an SSH tunnel for an added layer of security.
Connect to Fivetran on a Virtual Private Network to safeguard information traveling over the internet.
Avoid exposure to the public internet by connecting via AWS PrivateLink, Azure Private Link, or Google Private Service Connect.
A simple and secure connection to your database sources, initiating communication with Fivetran and eliminating the need to open any inbound firewall ports.
A fully managed service that meets the strictest enterprise security protocols.

Ensure compliance and privacy with data residency

Geographic selection

Select your preferred data processing geographic region for each destination and its corresponding connectors.

Cloud provider selection

Fivetran’s default cloud service provider is Google Cloud Platform, or you can choose to run on Amazon Web Services or Azure on our Enterprise plan.

Cloud region selection

Retain data processing to a specific cloud region (ie- US GovCloud) for each destination and its connectors.

Features vary by plan. To find out exactly which plan works for you explore all features and pricing plans.

Compliance & certifications

With the most comprehensive privacy, security, and compliance program of any cloud ELT platform on the market, your data reuptation is in safe hands

Visit our trust center

SOC 1 & SOC 2

Auditing procedures ensure security and management of data.

Regional DPAs

Contractually committed to compliance with EU and US laws with GDPR and CCPA.

HIPAA BAA

Meet HIPAA requirements with a business associate agreement signed by Fivetran.

ISO 27001

Fivetran meets the requirements set forth by this globally recognized, standards-based approach to security.

PCI DSS Level 1

Annual assessment by Qualified Security Assessors against the current PCI DSS requirements.

HITRUST

Widely considered the gold standard in satisfying HIPAA’s strict security requirements.

Hybrid deployment: A managed service that meets the strictest enterprise security protocols

Leverage Fivetran’s cloud-based platform, while processing data in your secure environment.

Learn more about hybrid deployment

Trusted by data driven enterprises

View all case studies
"Fivetran's reputation spoke for itself. We knew it could move our large - and growing - volumes of data from all of our sources securely. We didn't even evaluate other solutions. The face that claims data stored as flat files in GCS could be moved was the clincher. Everyone form data engineers to analysts were bought into Fivetran."
Trenton Huey
Senior Manager of Data Engineering at Vida Health
"One of the biggest challenges for marketing teams is integrating data from all their global partners. Now that we're leveraging Fivetran, we're able o bring data into our ecosystem quickly and safely."
Guli Zhu
Head of Marketing Analytics at Square
"Our strategies for supporting financial crime detection and real-time personalization, including the adoption of generative AI, require real-time data. Fivetran enables us to provide the best customer experience with fresh, reliable and complaint data."
Joanna Gurry
Executive of Data Platforms at National Australia Bank

FAQS

How is the data moving through Fivetran?
Fivetran encrypts data, keys and, credentials during the extract phase of the sync and decrypts during the load phase. Learn more about data and credential encryption.
My source has a lot of PII data that we don’t want in our destination. What do I do?
Fivetran offers the option to block any objects or columns from replicating to your destination. Simply deselect unneeded data in the connector’s schema and we won’t replicate those items. In the case that you need certain data for analytic purposes, hash those columns in the schema and Fivetran will land a hashed value in your destination which can still be used for joins across sources but appears as an anonymized value. Learn more about data blocking and column hashing
Can Fivetran employees access my data?
Fivetran employees can only access your data with your approval. Access may be requested to aid in troubleshooting but is completely within your control and can be revoked at any time. Additionally, our customer managed keys feature allows you to control the master encryption key used for credentials and data, allowing you to revoke Fivetran’s access at any time. Business Critical customers can also add US-only support.
Can my data stay in Europe?
All Fivetran customers have control over the data processing location of their data. You can ensure Fivetran data processing always occurs in the EU, for example, to help meet your GDPR requirements. Our Enterprise and Business Critical plans offer more granular controls to select a preferred cloud service provider or a specific cloud region.
Is Fivetran equipped to move healthcare data?
Fivetran complies with Health Insurance Portability and Accountability Act (HIPPA) requirements for Protected Health Information (PHI) and will sign a Business Associate Agreement (BAA). Our Business Critical plan comes with HITRUST certification.
Can Fivetran safely move credit card data? 
We maintain PCI DSS Level 1 certification, available on our Business Critical plan.
Can we still use Fivetran if our DBSas won’t allow you to connect to our databases? 
Fivetran offers a number of flexible connection and deployment options that our customer DBAs and security teams find to meet their requirements. VPN and SSH tunnels are most commonly used, with private networking and on-prem and hybrid deployment as more robust options.
I need a hosted or on-premises data integration solution. Can Fivetran support that?
Fivetran High Volume Replication (HVR) is a self-hosted solution for your on-premises database sources. We also offer a Hybrid Deployment model which enables companies to leverage Fivetran services while ensuring their data never leaves their cloud or on-premises network. Both Hybrid Deployment and Fivetran HVR are available on our Business Critical plan.
Where can I find access to your security certifications in case of an audit? 
Visit our Trust Center to browse and gain access to all our security and compliance documentation.

Book a demo with our dedicated in-house security experts

Request a demo

Our team will help you:

Understand how Fivetran can safely move data from your sources

Assess your security and compliance requirements

Select the best Fivetran plan for you based on applicable features and requirements