Security

Gathr is fully devoted to enable its users with full control over their data and personal information.

Core Security Features

The fundamental security features in Gathr are listed below:

  • All connections to Gathr website and data are secured with HTTPS.

  • Single Sign-On authentication method is supported by Gathr for organizations managing their users with an Identity Provider.

  • All data sources and destinations that support SSL connectivity have provisions in Gathr to upload PEM certificates and encrypt respective connections.

  • Gathr requires only READ permissions to communicate with the data sources. It collects the schema information and sample data from the source to ease the data preparation step for its users. The sample data gets deleted once the application using the source is deleted.

  • If your data storage solutions are set to deny public accessibility, in such scenarios Gathr offers connection to them using SSH tunneling option. To know more, see SSH Tunneling.

  • Gathr uses CREATE/WRITE permissions to transmit data into destinations only within the schema which you select while application configuration.

  • Gathr provides an option for the applications created by you to run in the preferred cloud platform of your choice by setting up compute setup environment. To know more, see Compute Setup →

  • Gathr stores the user profile details that you choose to save in the update profile section and only requires an email ID for registration.

  • All the account related information and applications created are completely deleted once a user opts to delete a registered profile, except in a condition when any invoice settlement is due. The user profile details in such a condition gets deleted once the dues are settled.

To get help with any queries related to security or to share any comments, we encourage you to contact us at: saas-support@gathr.one

Top