GX Cloud Security

GX Cloud has comprehensive security controls for your data. That means it fits right in with your existing security protocols and compliance norms.

hexagons

Features and highlights

Grid item image
Data privacy

We are your partners in compliance with data protection requirements. GX Cloud collects and stores aggregate metrics and data samples that help you identify data quality issues. We offer a variety of deployment options that are tailored to your existing technology stack and data protection requirements. You control data stored and displayed in GX Cloud, and we safeguard it. We collect and retain only the minimum amount of data necessary to provide GX services and anonymize sensitive information whenever possible to reduce the risk of data exposure.

Grid item image

Continuous monitoring and threat detection

We proactively identify and respond to potential security threats using robust logging, monitoring tools, and intrusion detection.

Grid item image

Encryption and access control

We use strong encryption mechanisms to protect data both in transit and at rest, as well as role-based access control mechanisms to ensure that only authorized personnel can access sensitive data.

Grid item image

Secure development practices

Security is incorporated into the development lifecycle, from initial design through deployment and maintenance. Our team follows best practices, conducts regular security assessments and code reviews, and addresses vulnerabilities according to defined commitments.

Grid item image

Disaster recovery and incident response

We regularly review, test, and refine our disaster recovery and incident response plans. We are prepared to quickly respond to, recover from, and communicate any security incident.

©2024 Great Expectations. All Rights Reserved.