Your data requires the highest levels of built-in security.
Robust security, privacy and governance from source to destination
Data is encrypted both in transit and at rest.
Anonymize personal data
Block or hash sensitive data before it touches a destination.
Data doesn’t persist
Data is purged as soon as it’s successfully written to the destination.
Transparency & auditability
Full control over data access and detailed logging means full control over how data is handled — and by whom.
Control data access
Granular role-based access control ensures users get the right level of access.
Secure sign on
We support Okta, OneLogin, and more to configure SSO/SAML single sign-on.
Provides additional features that put your organization ahead of the pack.
Connect your way with reverse SSH and VPN tunnels.
Custom role-based access gives you greater control over who can do what.
Send detailed logs to external logging services like AWS CloudWatch and Splunk for deeper auditing and proactive pipeline alerting.
Business Critical Plan
Maximum security and privacy compliance with advanced features for enterprises with especially sensitive data.
Avoid sending data over the public internet with native integrations to cloud specific connection options.
Fully own the master key used for encrypting credentials.
Connect Fivetran to systems within a PCI boundary.
Select your cloud provider (AWS or GCP) and data processing region.
Our dedicated security and privacy teams manage privacy, governance, risk, and compliance (GRC), and collaborate with product management in development, operations, and product roadmap, ensuring that our company is as secure as our product.
Chief Security Officer, Tom Conklin
Data Protection Officer, Alexis Kirkman
Extensive privacy & security training
All Fivetran employees are trained on the latest in data privacy and security best practices.
Vendor audit and approval process
All third-party tools go through vetting before adoption.
Easy data auditing through tracking of data storage, movement, and more.
Data deletion requests
For data we control and process, deletion requests are fully supported.
Resilience & uptime
Service Level Agreements guarantee uptime without compromising performance.
Data protection agreements
Fivetran commits to protecting data as written in our Data Protection Agreement.
Start for free
Join the thousands of companies using Fivetran to centralize and transform their data.