Our Top Priority

Security at Pinpoint.

There’s no such thing as “too secure.” We put data protection at the front of every decision we make.

Your data is our highest priority.
Data Privacy & Protection

Your data is our highest priority.

Pinpoint is a SaaS platform with an Agent that can run either in our cloud or on customer premises. Security is built into each architectural layer, and we conduct regular independent audits of our entire cloud architecture.

  1. 1. Pinpoint Agent connects via tokens or service accounts to source APIs.
  2. 2. Agent fetches one-time user session for permission to connect to cloud storage.
  3. 3. Once approved, the agent streams signal metadata changes to cloud storage.
Auditing Controls & Certifications

Transparency builds trust.

We use the best practices and assurances that come with pursuing our SOC 2 compliance, which we share with every customer.

Capabilities

Built on the best.

Pinpoint has made extensive investments in data privacy and security, including:

Resilience and Uptime

Resilience and Uptime

Pinpoint is designed for uninterrupted uptime and seamless rollouts of each release. We work to deliver capabilities to customers quickly with security as a foundation of everything we do

Data Deletion Requests

Data Deletion Requests

Pinpoint respects your right to be forgotten and supports full data deletion upon request.

Data Segregation & PII

Data Segregation & PII

Customer PII data is encrypted in transit and anonymized the moment it enters our cloud. Our internal dev teams have no access to any PII even as they work with real data.

Encryption & Access Controls

Encryption & Access Controls

Our architecture is designed to keep all requests encrypted with SSL/TLS connections. This starts the first time our agent connects to a source system and is maintained throughout the handling of your data.

Privacy & Trust

Privacy & Trust

Data is processed and anonymized every step of the way ensuring your sensitive information is protected. You can also trust us to dispose of your data quickly upon request.

Compliance

Compliance

SOC 2 Type I (pending audit), GDPR and regular audits by a 3rd party security firm for AWS infrastructure as well as penetration testing.

Frequently Asked Questions.

What does Pinpoint do to protect our data?Expand
  • Data encryption in both transit and at rest

  • TLS encryption at every point

  • 24x7 monitoring of our systems for intrusion detection and anomalies

As soon as your data enters our cloud application it is simultaneously brought online in production and anonymized in development. Only you have access to your data along with Pinpoint support or DevOps team members as required.

Yes. We conduct regular third-party assessments of our infrastructure, including penetration testing.

Ask Us Anything

Questions about security?

Have a question, concern, or comment about Pinpoint security? Please contact our Security Team.