As a company founded by data center operations experts, LogicMonitor has a strong commitment to the security standards of its applications operations and back office systems.

Security Overview

The LogicMonitor Collector

The LogicMonitor Collector is a enterprise-grade Java application that’s installed on our customers’ networks. It is responsible for polling monitored devices using various mechanisms and sending the data back to the LogicMonitor platform for processing. Because it’s written in Java, it can be installed on any Windows or Linux system.

Datacenter Security

  • SSAE 16 SOC1 Type 2 facilities
  • 24x7x365 manned, secured data centers
  • Servers housed in locked cages
  • Ingress and egress secured with electronic keycards and biometric hand scans
  • 24x7x365 high resolution, motion-sensitive video surveillance
  • Fully redundant power and HVAC
  • VESDA Fire-threat detection and suppression

Network Security

  • All network connections are protected using TLS
  • Multi-layer firewall security
  • Off site audit logs of all accounts accessed
  • External vulnerability scans
  • Servers run on hardened operating systems with the current security patches

Redundancy & Uptime

  • Multiple datacenters
  • Redundant routers, switches, and geographically separate backup systems
  • Data replicated both locally and geographically


What are the security impacts of running a LogicMonitor Collector in my network?
The Collector has been carefully designed and developed with high-security in mind. In operation, the Collector accepts no connections from the network, and initiates only outbound connections: either within your LAN to the devices it’s been assigned to monitor or out to the LogicMonitor platform. The Collector stores all device data in-memory and buffers it only long enough to transmit to LogicMonitor servers.

What level of access does the Collector have to the devices it monitors?
LogicMonitor’s best practices dictate that the Collector has the least possible privileges to gather instrumentation for any given device; typically, this is read-only access. Access configuration for a device is entirely within our customer's control, and our documentation provides details on how to configure the minimum required rights.

How is data transmitted between the Collector and the LogicMonitor platform?
All communication between the Collector and LogicMonitor servers occurs over the HTTPS protocol using TLS encryption encoded with only the strongest ciphers. Communication is always initiated by the Collector as outgoing HTTPS connections and are typically in accordance with our customer's existing firewall security policies. Further, the Collector uses certificate authentication to thwart any man-in-the-middle attacks between itself and the LogicMonitor platform.

What kind of data is collected and stored?
There are two classes of information collected and stored by the LogicMonitor platform: device properties (IP address, system type, snmp community string, etc) and performance information (CPU load, disk utilization, request latency, etc). All device properties, including those that are not typically sensitive, are encrypted at rest on LogicMonitor’s systems. Less sensitive performance data is stored in a proprietary high-performance time-series database system.

Who can see the collected data?
Only your users can see your data. Administrative users can add, delete, suspend, or change the access levels of other users in your account. User accounts can be defined with different privilege levels to control whether they can view or change data in the system. While the default configuration has an account enabled for LogicMonitor support staff, it may be disabled at any time. Once disabled, you may elect to temporarily enable that account so we can login to help you with a specific issue.

What kind of user information does LogicMonitor store?
The LogicMonitor platform does not store any customer employee data other than name, email address, and mobile number for those that opt to receive alerts via SMS. User passwords are not stored at all; we exclusively use salted one-way hashes. Alternately, LogicMonitor supports authentication via any SAML2 compliant Identity Provider system such as ADFS.

How is the LogicMonitor platform protected?
Our servers are located in professionally managed datacenters with the highest-grade security measures:

  • SOC 2 Type 2 or ISO 27001 certified
  • Servers housed in locked cabinets
  • Ingress and egress secured with electronic key cards and biometric scans
  • 24×7x365 high resolution, motion-sensitive video surveillance
  • Fully redundant power and cooling
  • VESDA Fire-threat detection and suppression

What operational procedures do you have to protect collected data?
The LogicMonitor platform is subject to rigorous controls to ensure the security, availability, and confidentiality of our customer’s data. We have completed a third-party audit of our compliance with SOC 2 Type 1 security controls and can provide our customers with our audit report which details our internal operational policies in these areas.

Let's get started.

Get a 14-day free trial, no CC required.

Sign Up Free explore platform