Your data is safe in our hands. Really.

Security best practices are built into every layer of the LogicMonitor experience, from our technical architecture to our everyday business operations.

Tour the platform
robot hands holding up graphs

The LogicMonitor platform is certified to:

Trusted by the best, who need the best.

Vpay Company Logo

Financial services organization

Hid Company Logo

global idenity management

Bupa Company Logo

healthcare efficiency software

Secure architecture

The LogicMonitor product was built by IT security experts.

  • checkmark icon Automatic encryption of sensitive data, both in transit and at rest
  • checkmark icon Strong user authentication controls, including both 2FA and SAML integration
  • checkmark icon Fine-grained role-based access controls allow you to tailor access to your environment to fit your specific needs.
  • checkmark icon Formal security software development lifecycle, with multiple stages of threat modeling and security testing

Secure data collection

The LogicMonitor Collectors you install within your operating environments are designed for optimum security.

  • checkmark icon Collectors initiate only outbound communications to the LogicMonitor platform, secured with TLS encryption.
  • checkmark icon Each Collector is mutually authenticated to your account using modern cryptographic techniques.
  • checkmark icon Collectors maintain sensitive data only in-memory and have no inbound network ports vulnerable to attack.

Secure operations

LogicMonitor’s operational platform is protected with best-in-class security.

  • checkmark icon Built on security-hardened Linux servers with perimeter and host-based intrusion prevention systems
  • checkmark icon Multiple levels of redundancy are integrated throughout the service platform to ensure high availability.
  • checkmark icon Operated out of top-tier data centers and AWS regions, all with best-of-breed physical security

Secure practices

We maintain and use all customer data in alignment with the EU General Data Protection Regulation (GDPR) requirements.

  • checkmark icon Minimal incidental personal data is stored for alert delivery and audit logging purposes only.
  • checkmark icon Device access credentials are encrypted and stored only in memory—never written to disk.
  • checkmark icon Salted one-way hashes are stored in place of user passwords.

Secure standards

The LogicMonitor platform is subject to ongoing third-party validation to ensure the security, availability, and confidentiality of your data.

  • checkmark icon Application penetration testing, conducted by professional security consultancies, ensures that our product remains hacker-proof.
  • checkmark icon AICPA SOC 2 Type 2 audits validate the controls that provide for security, high availability, and data confidentiality.
  • checkmark icon Certification to the ISO 27000 family of standards demonstrates our commitment to holistic information security management across the organization.
Secure username and password login graphic
Checkmark graphic
Linux graphic
GDPR Standards graphic
Merlin robot graphic

Secure architecture

The LogicMonitor product was built by IT security experts.

  • checkmark icon Automatic encryption of sensitive data, both in transit and at rest
  • checkmark icon Strong user authentication controls, including both 2FA and SAML integration
  • checkmark icon Fine-grained role-based access controls allow you to tailor access to your environment to fit your specific needs.
  • checkmark icon Formal security software development lifecycle, with multiple stages of threat modeling and security testing
Secure username and password login graphic

Secure data collection

The LogicMonitor Collectors you install within your operating environments are designed for optimum security.

  • checkmark icon Collectors initiate only outbound communications to the LogicMonitor platform, secured with TLS encryption.
  • checkmark icon Each Collector is mutually authenticated to your account using modern cryptographic techniques.
  • checkmark icon Collectors maintain sensitive data only in-memory and have no inbound network ports vulnerable to attack.
Checkmark graphic

Secure operations

LogicMonitor’s operational platform is protected with best-in-class security.

  • checkmark icon Built on security-hardened Linux servers with perimeter and host-based intrusion prevention systems
  • checkmark icon Multiple levels of redundancy are integrated throughout the service platform to ensure high availability.
  • checkmark icon Operated out of top-tier data centers and AWS regions, all with best-of-breed physical security
Linux graphic

Secure practices

We maintain and use all customer data in alignment with the EU General Data Protection Regulation (GDPR) requirements.

  • checkmark icon Minimal incidental personal data is stored for alert delivery and audit logging purposes only.
  • checkmark icon Device access credentials are encrypted and stored only in memory—never written to disk.
  • checkmark icon Salted one-way hashes are stored in place of user passwords.
GDPR Standards graphic

Secure standards

The LogicMonitor platform is subject to ongoing third-party validation to ensure the security, availability, and confidentiality of your data.

  • checkmark icon Application penetration testing, conducted by professional security consultancies, ensures that our product remains hacker-proof.
  • checkmark icon AICPA SOC 2 Type 2 audits validate the controls that provide for security, high availability, and data confidentiality.
  • checkmark icon Certification to the ISO 27000 family of standards demonstrates our commitment to holistic information security management across the organization.
Merlin robot graphic

From the LogicBlog