Enterprise-grade security and compliance

Keeping your data safe is our main job. Unlike other tools that charge extra for security, Domo builds safety into every part of the platform from day one.

Product video data integration overview
Play video | 1:17
Take a quick look at the Domo Trust Program

Data protection for enterprises that scales

Domo meets security, compliance, and privacy requirements for regulated industries including financial services, healthcare, life sciences, government, and energy.

Organizational commitment

Domo's Security Council, made up of senior technology and business leaders, sets security policy, reviews risks, and ensures accountability across the company.

Built-in security features

Domo builds security, compliance, and privacy controls into the platform at the infrastructure, application, and data levels. Customers can also manage their own security settings directly.

Ongoing review

Domo reviews its security standards regularly against frameworks such as SOC 2, ISO 27001, and HIPAA.

Safety checked by experts

Domo completes third-party audits, compliance assessments, and annual penetration tests to meet customer and regulatory requirements. Current certifications include SOC 1, SOC 2, ISO 27001, ISO 27018, HIPAA, HITRUST, GDPR, and CCPA.

Collection of security and privacy certification logos including GDPR, BSI ISO 27001 and ISO 27018, HIPAA One compliance, AICPA SOC 1 and SOC 2, CCPA, AAR360 ISO 27018:2019 and ISO 27001:2022 certifications, and HITRUST.

32%

of fortune 50 global companies
People at the officeApria Healthcare logo
Woman working on a tablet close to the building window

Over 32% of Fortune 50 Global companies, including many of the largest organizations in the US, Europe, Asia, and Australia, trust Domo for robust, scalable data protection.

Security in every layer

High standards are built into the very foundation of how we store and move your data every day.

Domo's security framework includes:

  • Multiple logical and physical security layers
  • “Least privilege” and “separation of duties” access model
  • Threat assessments of each new feature
  • Transport layer encryption and encryption at rest
  • Extensive logging and monitoring of network, system, and application events
Product feature trust security infrastructure

32%

of fortune 40 global companies
Large canopy of a buildingEDP logo
EDP Customer Story Dashboard

“We wanted to manage data as a corporate asset, and Domo was a good listener. They helped us draw a framework, an architecture, and a governance model that helped us achieve that.”

Pedro Maia
Pedro Maia
Director of IT, Data, BI and Analytics, EDP Comercial
See the story

Tools that put you in control

In addition to advanced internal security controls, Domo also gives customers direct control over their own security settings. These include single sign-on, multi-factor authentication, IP restrictions, and role-based access controls.

Product feature governance list people connect sso settings

32%

of fortune 40 global companies
Woman working at the customer serviceGant logo
Woman working at the customer service

"As the security officer, I was incredibly aware of the fact that we were putting sensitive information out there. We needed it to be permission-based so that not just anybody who logs into the gateway at a certain company could have access to all this information… Since everything was in the gateway already, we had the ability to make those logins very specific as to what you had access to, which we took advantage of."

Image of Jenni Murer
Jenni Murer
Chief Information Officer
See the story

BYOK encryption

With Bring Your Own Key (BYOK) encryption, you supply and control the encryption keys for your Domo environment. This lets you meet internal security policies without relying on Domo-managed keys. You can rotate encryption keys multiple times per day, on a schedule you define. If you revoke your encryption keys, all data in your Domo instance becomes immediately unreadable.

Product feature trust byok bring your own key

Responsible disclosure policy

While you manage your data, Domo's security team works with security researchers to review, reproduce, and respond to reported vulnerabilities.

Before disclosing any vulnerability publicly or to a third party, please report it privately to Domo first.

If you responsibly submit a vulnerability report to Domo, the Domo security team will:

  • Promptly acknowledge receipt of your report
  • Provide an estimated time frame for addressing the reported vulnerability
  • Notify you when the vulnerability has been resolved
Lifestyle two men meeting blue shirt tablet paper

Stay in control of your data

Make sure the right people see the right info. You can set simple rules to keep your data safe as your team grows.

Explore Domo’s governance and security features.

Make data accessible while maintaining complete security and control.

Ready to get started?
Try Domo now or watch a demo.