Stitch Documentation
has moved!

Please update your bookmarks to

If you're not automatically redirected after 5 seconds, click here.

What kind of security protocols do you have in place?


    Our data centers are protected by electronic security and intrusion detection systems and a 24/7/365 human staff. Our operating systems and other software are kept up to date with the latest security patches. Our network is protected by dedicated firewall services to prevent unauthorized access, and our systems regularly undergo automated vulnerability scans.

    Those are just our internal measures. We also take great care to ensure your data is secure as it makes its way through Stitch and into your data warehouse.

    Was this article helpful?
    0 out of 0 found this helpful


    Questions or suggestions? If something in our documentation is unclear, let us know in the comments!