Security
Transcend offers some of the strictest product security measures in the industry.Transcend is the only data privacy partner that can reduce your breach risk rather than add to it. From end-to-end encryption, to single sign-on (SSO) on every plan, Transcend is designed from the ground up with robust security controls.
Learn how to deploy Sombra, our self-hosted security gateway, and configure additional features that help your company eliminate operational risk.
End-to-end encryption
How to keep your data between just you and your end-users.
Access control
Manage who can perform certain operations within the Transcend system
Audit trail
View all activity related to product configuration, DSRs, or integrations
Regionalized Infrastructure
Select the region in which your customer data is stored
Setting up SSO
Configure single sign on with SAML so employees in your organization can log in with Okta, OneLogin, G Suite, Auth0, or other identity providers.
Security Certifications
Request to view Transcend's security compliance reports.
Transcend's subprocessors
The services Transcend uses to process customer data
Reporting an incident
How to report security-related information to Transcend