Skip to content

Tulip Trust Center

Trust isn’t built by words or a single control. It’s achieved through a comprehensive, integrated controls framework that provides a trusted foundation for continuous transformation.

Security

Customer trust is our foundation and drives our focus on securing data at all levels. We embed security into our products and the fabric of our operational and organizational processes.

Our company-wide controls protect your data

  • Training

    All employees complete security awareness training and have simulated phishing emails annually.

  • Confidentiality

    All employee contracts include a confidentiality agreement. All US-based employees undergo a background check.

  • Tulip Employee Access

    Access to Tulip internal and production systems is strictly controlled and requires multi-factor authentication.

  • Security Incident Response

    Tulip employs a controlled approach for reporting, assessing, containing, remediating, and communicating security incidents should they arise.

We secure your data with modern security practices

  • Encryption

    Tulip data is encrypted at rest and in transit using industry-standard encryption.

  • Penetration Testing

    Tulip uses 3rd parties to scan for vulnerabilities in Tulip’s infrastructure, hardware, and perimeter.

  • Vulnerability Scanning

    As a security practice, Tulip continuously scans for vulnerabilities.

  • Firewall/IDS/IPS

    All Tulip servers are behind a firewall that limits administration outside a Tulip-controlled IP address.

  • API Encryption

    Our API and application endpoints are TLS/SSL only and score an “A+” rating on Qualys SSL Labs’ tests.

  • Real-Time Monitoring

    Stay protected with Tulip’s cloud infrastructure that is continuously monitored and managed to resolve anomalies before they escalate.

Protect your apps and data with platform security features

  • Authentication

    Leverage your existing corporate identity infrastructure to secure your data, including SAML, LDAP, and Active Directory.

  • Deployment Options

    Tulip is available in multiple geographical regions with different cloud providers including AWS, Azure, and AWS Gov Cloud

  • Application Security

    Secure your data with app and connector authentication

  • SSO

    Single Sign-on (SSO) allows you to authenticate users in systems. (Enterprise Only)

  • SAML

    Integrate Tulip with your existing SAML provider.

  • Advanced Access Control

    Prevent unauthorized access to sensitive data with granular access and permission controls.

Digitally transform your operations with Tulip

See how systems of apps enable agile and connected operations.

Day in the life CTA illustration