• Home
  • Articles
  • Changelog
  • Get a demo
  1. Home
  2. Articles
  3. Security

Security

Access Control
Access Control Overview
Adding, Revoking, & Auto-Provisioning Access
Scopes & Permissions
Switching Between Transcend Accounts
Single Sign On (SSO)
Setting up SSO
Okta SSO Configuration Guide
Google SSO Configuration Guide
Azure AD SSO Configuration Guide
Audit Trail
Transcend's Security Certifications
Reporting an incident

Security

Transcend offers some of the strictest product security measures in the industry.

Transcend is the only data privacy partner that can reduce your breach risk rather than add to it. From end-to-end encryption, to single sign-on (SSO) on every plan, Transcend is designed from the ground up with robust security controls.

Learn how to deploy Sombra, our self-hosted security gateway, and configure additional features that help your company eliminate operational risk.

Access Control

Safeguard your system and data by providing the right access to the right people

Switching Between Transcend Accounts

For businesses with subsidiaries and multiple accounts / instances

Single Sign On (SSO)

Configure Single Sign On with SAML for employee login

Audit Trail

View all activity related to product configuration, DSRs, or integrations

Transcend's Security Certifications

Request to view Transcend's security compliance reports

Transcend's Subprocessors

The services Transcend uses to process customer data

Reporting an incident

How to report security-related information to Transcend

ArticlesAPI ReferenceChangelogSystem StatusGet a demoLog InOur Privacy Center