Skip to content
Stock photo - working on a computer

Tulip Trust Center

Security

Customer trust is our foundation and drives our focus on securing data at all levels. We embed security into our products and the fabric of our operational and organizational processes.

  • Company Security

    Tulip’s data control procedures protect your most sensitive data.

  • Infrastructure Security

    Tulip takes securing your data very seriously with modern practices

  • Platform Security Features

    Tulip's Platform includes options that allow you to secure your data

Our company-wide controls protect your data

  • Training

    All employees complete security awareness training and have simulated phishing emails annually.

  • Confidentiality

    All employee contracts include a confidentiality agreement. All US-based employees undergo a background check.

  • Tulip Employee Access

    Access to Tulip internal and production systems is strictly controlled and requires multi-factor authentication.

  • Security Incident Response

    Tulip employs a controlled approach for reporting, assessing, containing, remediating, and communicating security incidents should they arise.

We secure your data with modern security practices

  • Encryption

    Tulip data is encrypted at rest and in transit using industry-standard encryption.

  • Penetration Testing

    Tulip uses 3rd parties to scan for vulnerabilities in Tulip’s infrastructure, hardware, and perimeter.

  • Vulnerability Scanning

    As a security practice, Tulip continuously scans for vulnerabilities.

  • Firewall/IDS/IPS

    All Tulip servers are behind a firewall that limits administration outside a Tulip-controlled IP address.

  • API Encryption

    Our API and application endpoints are TLS/SSL only and score an “A+” rating on Qualys SSL Labs’ tests.

  • Real-Time Monitoring

    Stay protected with Tulip’s cloud infrastructure that is continuously monitored and managed to resolve anomalies before they escalate.

Protect your apps and data with platform security features

  • Authentication

    Leverage your existing corporate identity infrastructure to secure your data, including SAML, LDAP, and Active Directory.

  • Deployment Options

    Tulip is available in multiple geographical regions with different cloud providers including AWS, Azure, and AWS Gov Cloud

  • Application Security

    Secure your data with app and connector authentication

  • SSO & LDAP

    Single Sign-on (SSO) and Lightweight Directory Access Protocol (LDAP) allow you to authenticate users in systems. (Enterprise Only)

  • SAML

    Integrate Tulip with your existing SAML provider.

  • Advanced Access Control

    Prevent unauthorized access to sensitive data with granular access and permission controls.

Reliability & Availability

Tulip implements many reliability controls to ensure your data is available when you need it, including data/record backup and an annual disaster recovery verification exercise.

Stock photo - governance - security - computers database

Digitally transform your operations with Tulip

See how systems of apps enable agile and connected operations.

Day in the life CTA illustration