Security
Transcend offers some of the strictest product security measures in the industry.Transcend is the only data privacy partner that can reduce your breach risk rather than add to it. From end-to-end encryption, to single sign-on (SSO) on every plan, Transcend is designed from the ground up with robust security controls.
Learn how to deploy Sombra, our self-hosted security gateway, and configure additional features that help your company eliminate operational risk.
End-to-End Encryption
How to keep your data between just you and your end-users
Access Control
Safeguard your system and data by providing the right access to the right people
Switching Between Transcend Accounts
For businesses with subsidiaries and multiple accounts / instances
Single Sign On (SSO)
Configure Single Sign On with SAML for employee login
Audit Trail
View all activity related to product configuration, DSRs, or integrations
Regionalized Infrastructure
Select the region in which your customer data is stored
Transcend's Security Certifications
Request to view Transcend's security compliance reports
Transcend's Subprocessors
The services Transcend uses to process customer data
Reporting an incident
How to report security-related information to Transcend