Skip to content
Stock photo - working on a computer

Tulip Trust Center

Security

Tulip is committed to keeping your data safe with operations-grade security.

  • Company Security

    Tulip’s data control procedures protect your most sensitive data.

  • Infrastructure Security

    Tulip takes securing your data very seriously with modern practices

  • Platform Security Features

    Tulip's Platform includes options that allow you to secure your data

Security for companies of 5 to 500,000

Customer trust is our foundation and motivates our focus on securing data at all layers. We embed security not only into our products but into the very fabric of our operational and organizational processes.

Data control procedures to protect your most sensitive data.

  • Training

    All employees complete security awareness training and have simulated phishing emails annually.

  • Confidentiality

    All employee contracts include a confidentiality agreement. All US-based employees undergo a background check.

  • Tulip Employee Access

    Access to Tulip internal and production systems is strictly controlled and requires multi-factor authentication.

  • Security Incident Response

    Tulip employs a controlled approach for reporting, assessing, containing, remediating, and communicating security incidents should they arise.

Securing your data with modern infrastructure practices.

  • Encryption

    Tulip data is encrypted at rest and in transit using industry-standard encryption.

  • Penetration Testing

    Tulip uses 3rd parties to scan for vulnerabilities in Tulip’s infrastructure, hardware, and perimeter.

  • Vulnerability Scanning

    As a security practice, Tulip continuously scans for vulnerabilities.

  • Firewall/IDS/IPS

    All Tulip servers are behind a firewall that limits administration outside a Tulip-controlled IP address.

  • API Encryption

    Our API and application endpoints are TLS/SSL only and score an “A+” rating on Qualys SSL Labs’ tests.

Secure access to your apps and data with platform security features.

  • Authentication

    Leverage your existing corporate identity infrastructure to secure your data, including SAML, LDAP, and Active Directory.

  • Deployment Options

    Tulip is available in multiple geographical regions with different cloud providers including AWS, Azure, and AWS Gov Cloud

  • Application Security

    Secure your data with app and connector authentication

  • SSO & LDAP

    Single Sign-on (SSO) and Lightweight Directory Access Protocol (LDAP) allow you to authenticate users in systems. (Enterprise Only)

  • SAML

    Integrate Tulip with your existing SAML provider.

Reliability & Availability

Tulip implements many reliability controls to ensure your data is available when you need it, including data/record backup and an annual disaster recovery verification exercise.

Stock photo - governance - security - computers database

Digitally transform your operations with Tulip

See how systems of apps enable agile and connected operations.

Day in the life CTA illustration