Security at Countly

From application usability to the hosting options and configurations, Countly meets any requirements you need with a comprehensive security program.

8-bit game icon emoji

Tight data security

Countly encrypts data at rest and in transit. We incorporate built-in Google Cloud Platform data encryption at rest using Google's Key Management Service, aligned with the industry’s best practices.
Cloud emoji

Cloud infrastructure security

Countly uses Google Cloud Platform to host our application. We make full use of the security products embedded within the GCP ecosystem. Additionally, we also separate each customer's data and resources in completely separate instances.
Magnifying glass emoji

Layered application security

Countly has an open source application core that is evaluated and tested by contributors and bounty hunters. Additionally, we regularly hire application security experts for third-party penetration tests.
These penetration testers evaluate the source code, running application, and the deployed environment.
Countly also uses high-quality static analysis tooling such as CodeQL, Deepscan, Codacy, SonarCloud, LGTM, or Dependabot, to secure our product at every step of the development process.
Lock with a key emoji

Security and privacy are everything to us

Data is the key to better products. Secure data is the key to products that users can trust.
Find out more

Ready to get started?

Talk to one of our data professionals to learn how Countly Enterprise can help your business become data-driven.
Request a Demo