Periscope Data Cloud Security

Nothing is more important than the security of your data. We know, because our success depends on it. That’s why we’ve built a cloud security infrastructure that follows industry wide best practices and standards. We’ve laid out our security practices in detail below. After reviewing, if you still need help—have a question, want further documentation, or just want to talk to someone at Periscope Data—let us know.

Have a Security Question?

Contact Us

Periscope Data Security Architecture

1 Customers connect to Periscope Data over HTTPS, the protocol used for online banking.  2 Periscope connects to customer databases from static IP addresses that customers can whitelist in their firewall settings. For databases in private networks, Periscope can connect through using SSH tunnels.  3 Periscope's Web and Backend servers connect to each other using encrypted connections over SSL.