Skip to main content

Information Security Management

Private Data Handling

Are you able to store and process my datasets within my VPC, rather than hosting them separately in your cloud environment?

Yes. Private Data Handling is a capability in Alteryx Analytics Cloud (AAC) that allows you to store your data and run data processing jobs in your own cloud infrastructure. Private data handling provides more security and control for customers with sensitive data. It also results in improved performance and reduced egress costs by moving the processing in AAC next to your data. For more information, see Private Data Handling.

Network and Application Penetration Tests

Do you conduct network/application penetration tests of your cloud service infrastructure regularly?

Yes.

Tenant Data Encryption and Segmentation

Is Auto Insights able to logically segment/encrypt customer data in such a way that access to data is confined to a single tenant without being provided inadvertently to other tenants?

All customer data is stored either in logically separated directories within network file systems with at-rest encryption, or in logically separated tables within databases including ClickHouse hosted on encrypted disks. We use Analytics Cloud our in-house access management systems to ensure data segregation for end-users.

Note

If Private Data Handling (PDH) is enabled for Auto Insights in your workspace, uploaded files are hosted in your own Private Storage, and your Auto Insights data is stored your own instance of ClickHouse within your VPC, and therefore is fully isolated from other users.

Data Storage Location

Are you able to restrict the storage of customer data to specific countries or geographic locations? Do you provide tenants with geographically resilient hosting options?

  • Alteryx Analytics Cloud hosts environments in US, AU, and EU (Germany).

  • If Private Data Handling (PDH) is enabled for Auto Insights in your workspace, your Auto Insights data is stored within your own VPC. See Supported Regions for Private Data Processing.

Information Security System Management

Do you restrict, log, and monitor access to your information security management systems (for example, hypervisors, firewalls, vulnerability scanners, network sniffers, and APIs)?

Access to information security management is restricted to the Auto Insights Platform Team, which maintains, logs, and monitors the system.

Firewalls

Are system and network environments protected by a firewall or virtual firewall to ensure compliance with legislative, regulatory, and contractual requirements?

Yes.