Skip to main content
Log in

Integrations

Hero background

HIPAA compliance, meet data activation across 100+ SaaS apps

Regulated teams can now execute sophisticated sales and marketing tactics without compromising compliance. Sync PHI and customer data safely with Hightouch.

Book a demo
Get startedBook a demo

Trusted by teams at

HeadwayThirty MadisonChapterIntelyCare

Trusted by teams at

SOC 2 Type 2 compliant.

SOC 2 Type 2 compliant

Your data stays secure, available, and confidential. To see our report, contact us at security@hightouch.com.

GDPR compliant.

GDPR compliant

If you’re in the EU, your data is only processed on EU data centers.

HIPAA compliant.

HIPAA compliant

Healthcare companies like ThirtyMadison, Chapter Health, and Headway trust Hightouch.

CCPA compliant.

CCPA compliant

To see our DPA (Data Processing Addendum), contact us at security@hightouch.com.

Activate PHI data securely

Safely sync PHI data from your warehouse to HIPAA Compliant destinations. Hightouch automatically hashes PII when syncing to platforms, plus we sync de-identified data to tools where you don’t have a BAA.

Learn more

Your data in your warehouse

Novel hybrid architecture

Hightouch never stores any of your data. We believe you should maintain control and take advantage of your existing architecture. Here’s how your data passes through Hightouch:

  • Hightouch runs queries directly on your warehouse.
  • You can choose to store all customer data temporarily in your cloud.
  • Hightouch transfers data to your destination without ever storing it.
Learn more
Novel hybrid architecture.

Control access on your own terms

Enterprise-ready on day one

Hightouch provides the control and governance capabilities you need to safely plug Reverse ETL into your tech stack.

  • SSO: Manage user authentication centrally with SAML SSO and keep access grants up-to-date with support for SCIM.

  • Role-based access: Leverage fine-grained permissions and custom roles to control who has access to specific workspace resources (models, destinations, and syncs).

  • Team labels: Share models and syncs with specific user groups and control permissions on those resources.

  • Audit logs: Track, monitor, and search all in-app user activity. Export reports and alerts to your preferred tools.

  • Approval flows: Require users to receive in-app approval before pushing changes into production. Rollback unintended changes immediately through Git.

Learn more
Enterprise-ready on day one.

We follow industry security standards

Product security

Our platform architecture and industry compliance certifications mean that your data is always secure.

  • We complete regular security-design reviews, pen tests using trusted security vendors, and conduct regular audits such as SOC 2 Type 2.
  • We encrypt all data at rest and protect it in transit with TLS. Hightouch’s metadata database is encrypted by Amazon AWS using standard AES-256 encryption algorithms.
  • We limit internal access to tools and resources using time-based access.
Learn more
Product security.

Ready to activate your data?

Get startedBook a demoBook a demo