Blueshift undergoes an annual security audit. We also have customers in the financial industry that have performed stringent due diligence on our platform and leverage Blueshift for their critical customer transactional and marketing messaging.

Blueshift’s underlying architecture (AWS) maintains a security audit trail for the hardware, premise security, and so on.

Encryption for data in transit and data at rest

Blueshift supports 2FA, encryption in transit, encryption at rest, and audit trails. All customer data is stored in a virtual private cloud that is assessed over an encrypted VPN with 2FA. Access to the VPN is protected through multi-factor authentication.

Archived data is encrypted at rest using AES256.

User roles

Blueshift offers several built-in capabilities to support multiple users with varying roles and different levels of permissions to limit their access to data. Different user roles can be assigned within Blueshift to limit the data that a user can access. You can also define custom roles with specific permissions to meet your specific user data access requirements.

For example, a user with the Analyst role has view only access and can view user data and audience segments, but cannot edit/update user profile data or audience segments. A user with the Manager role has the capability to view and edit/update user data and audience segments. For more information, see Users and user roles.

Audit trails

Blueshift offers a robust audit trail feature for Administrators that captures and tracks interactions for each user within Blueshift.

Single-Sign On

Blueshift supports SAML 2.0 federated single sign on. For more information, see Configure Single Sign-on via SAML

Additional information

Was this article helpful?
0 out of 0 found this helpful



Please sign in to leave a comment.