Security at Countly

From application usability to the hosting options and configurations, Countly meets any requirements you need with a comprehensive security program.

8-bit game icon emoji
Tight data security
Countly encrypts data at rest and in transit. We incorporate built-in Google Cloud Platform data encryption at rest using Google's Key Management Service, aligned with the industry’s best practices.
Cloud emoji
Cloud infrastructure security
Countly uses Google Cloud Platform to host our application. We make full use of the security products embedded within the GCP ecosystem. Additionally, we also separate each customer's data and resources in completely separate instances.
Magnifying glass emoji
Layered application security
Countly has an open source application core that is evaluated and tested by contributors and bounty hunters. Additionally, we regularly hire application security experts for third-party penetration tests.
These penetration testers evaluate the source code, running application, and the deployed environment.
Countly also uses high-quality static analysis tooling such as CodeQL, Deepscan, Codacy, SonarCloud, LGTM, or Dependabot, to secure our product at every step of the development process.
Lock with a key emoji

Security and privacy are everything to us

Data is the key to better products. Secure data is the key to products that users can trust.
Find out more ‚Üí

Ready to get started?

Talk to one of our data professionals to learn how Countly Enterprise can help your business become data-driven.
Request a Demo