Reltio Security & Compliance

Safe & Secure Data Management with Minimal Cost & Effort

Data innovators around the world rest easier
because they run their business on Reltio

Reltio Connected Customer 360 delivers enterprise-class security and granular, role-based visibility and control over your records and attributes. Reltio utilizes full range of cloud security mechanisms and best practices and on an ongoing basis performs validation and penetration tests to ensure best-in-class security and compliance.

With Reltio platform, you can enforce policies across the data lifecycle, including during data management and user access. Every time a record is viewed, updated, merged, or used, this activity is tracked within the platform's comprehensive audit log framework. These audit logs can then be used to monitor compliance and analyze usage patterns.

Count on our dedicated security
& compliance team

At Reltio, we have a dedicated security team that constantly monitors changes in regulatory requirements across industries. Led by our Chief Information Security Officer (CISO), this team ensures the Reltio platform adheres to the industry best practices and standards for data handling. In addition, on an ongoing basis, this team collaborates with product management to ensure the platform continues to deliver optimized security over the long term.

Young IT Engineers Inspecting Data Center Servers Young IT Engineers Inspecting Data Center Servers

Robust, Certified Security Controls

Reltio Connected Customer 360 offers a number of robust security controls, including single sign-on (SSO), role-based access control, and granular attribute visibility. The platform supports a range of authentication services and standards, including OKTA, OAuth2 SSO, SAML SSO, and Data at Rest encryption with Reltio Shield.  

The platform also offers the following certifications and standards support:

  • AWS SOC1 & SOC2 compliance certified
  • HITRUST CSF-certified
  • Compliant with EU General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) requirements for collecting, storing, updating and purging customer data
  • In addition, Reltio continues to certify and strengthen our platform based upon global changes in laws and regulations.

Full Tracking and Traceability

With the Reltio platform, authorized users from across the enterprise can see the status of requests, compare changes made at any point in time and view the complete authorization, workflow and approval chain associated with requests.

Security & Compliance 2 Laptop Security & Compliance 2 Laptop
BringYourOwn Key BringYourOwn Key

Reltio Shield [Data at Rest Encryption]

With Reltio Connected Customer 360, you can generate your own keys in accordance with your organization’s specific security policies and practices. With the platform, you can generate keys on demand. In addition, you can re-encrypt data in the background using the new keys, both manually and automatically, according to your desired schedule.


  • Reduce exposure to breaches and non-compliance.
  • Strengthen the security of customer data while reducing operational cost and effort.
  • Gain granular visibility into data changes to ensure compliance with policies and mandates.
LAPTOP1 Workflow&Gov01 LAPTOP1 Workflow&Gov01