Domo Trust – Enterprise Security & Compliance | Domo

SECURITY & COMPLIANCE

Domo’s Trust Program.

Ensuring the security and confidentiality of our customers’ data is the number one priority at Domo. The Domo Trust Program encompasses and represents the security, compliance, and privacy controls and features that protect our customers’ most sensitive data.

Product video data integration overview
Play video | 1:17
Take a quick look at the Domo Trust Program
f

Enterprise-grade data protection that scales.

Domo is built to meet the enterprise security, compliance, and privacy requirements of our global customers in highly regulated industries, such as financial services, healthcare, life sciences, government, energy, technology, and more.

Organizational commitment.

Security Council, composed of a cross-functional team of senior technology and business leaders, fosters the strong culture of security at Domo.

Built-in security features.

Domo has built security, compliance, and privacy controls into every layer of the platform, and includes customer-managed security features.

Ongoing review.

Domo continuously reviews security standards and features to ensure compliance with industry-accepted best practices and frameworks.

Compliance.

To ensure the requirements of customers and regulators are met, Domo completes numerous audits, assessments and compliance requirements—including rigorous third party network and system penetration tests.

Product feature trust compliance misc logos gdpr hipaa soc
32%
of fortune 40 global companies
People at the officeApria Healthcare logo

Over 32% of Fortune 50 Global companies, including many of the largest organizations in the US, Europe, Asia, and Australia, trust Domo for robust, scalable data protection.

Secure infrastructure.

Stay in control with Domo’s security framework that includes:

  • Multiple logical and physical security layers
  • “Least privilege” and “separation of duties” access model
  • Threat assessments of each new feature
  • Transport layer encryption and encryption at rest
  • Extensive logging and monitoring of network, system, and application events
Product feature trust security infrastructure
32%
of fortune 40 global companies
Large canopy of a buildingEDP logo

“We wanted to manage data as a corporate asset, and Domo was a good listener. They helped us draw a framework, an architecture, and a governance model that helped us achieve that.”

Pedro Maia
Pedro Maia
Director of IT, Data, BI and Analytics, EDP Comercial
See the story

Customer-managed security features.

In addition to advanced internal security controls, Domo provides extensive self-service security features that enable our customers to stay in control and have full transparency into their data at all times.

Product feature governance list people connect sso settings
32%
of fortune 40 global companies
Woman working at the customer serviceGant logo
Woman working at the customer service

"As the security officer, I was incredibly aware of the fact that we were putting sensitive information out there. We needed it to be permission-based so that not just anybody who logs into the gateway at a certain company could have access to all this information… Since everything was in the gateway already, we had the ability to make those logins very specific as to what you had access to, which we took advantage of."

Image of Jenni Murer
Jenni Murer
Chief Information Officer
See the story

Bring Your Own Key (BYOK) encryption.

With Domo’s BYOK encryption, you can manage your own cloud instance in accordance with internal security and compliance requirements. Domo BYOK provides the ability to rotate the encryption keys numerous times a day. You can revoke encryption keys at any time, nullifying all data in Domo, and ensure that no one will have access to sensitive customer data.

Product feature trust byok bring your own key

Responsible Disclosure Program

To encourage and streamline the process of responsible reporting of potential security vulnerabilities, the Domo security team is committed to working with security researchers to validate, reproduce, and respond to legitimate reports.

If you responsibly submit a vulnerability report to Domo, the Domo security team will:

  • Promptly acknowledge receipt of your report
  • Provide an estimated time frame for addressing the reported vulnerability
  • Notify you when the vulnerability has been resolved
Lifestyle two men meeting blue shirt tablet paper

We recognize that security researchers play a very important role in helping us keep Domo and our customers secure. We ask that you share any potential security vulnerabilities privately with Domo before disclosing to third parties or publicly.

Ready to get started?
Try Domo now or watch a demo.