GX Cloud Security

GX Cloud has comprehensive security controls for your data. That means it fits right in with your existing security protocols and compliance norms.

hexagons

Features and highlights

Yellow-green line-art icon of an anonymous figure wearing a wide-brimmed hat and trench coat.
Data privacy

We are your partners in compliance with data protection requirements. GX Cloud collects and stores aggregate metrics and data samples that help you identify data quality issues. We offer a variety of deployment options that are tailored to your existing technology stack and data protection requirements. You control data stored and displayed in GX Cloud, and we safeguard it. We collect and retain only the minimum amount of data necessary to provide GX services and anonymize sensitive information whenever possible to reduce the risk of data exposure.

Yellow line-art icon of a shield with circuit-board connection nodes at each corner.

Continuous monitoring and threat detection

We proactively identify and respond to potential security threats using robust logging, monitoring tools, and intrusion detection.

Pink line-art icon of a hand holding a key with a diamond-shaped bow.

Encryption and access control

We use strong encryption mechanisms to protect data both in transit and at rest, as well as role-based access control mechanisms to ensure that only authorized personnel can access sensitive data.

Purple line-art icon of a padlock with a keyhole, connected to four corner nodes by dotted lines.

Secure development practices

Security is incorporated into the development lifecycle, from initial design through deployment and maintenance. Our team follows best practices, conducts regular security assessments and code reviews, and addresses vulnerabilities according to defined commitments.

Teal line-art icon of a magnifying glass with a warning triangle inside it.

Disaster recovery and incident response

We regularly review, test, and refine our disaster recovery and incident response plans. We are prepared to quickly respond to, recover from, and communicate any security incident.

©2026 Great Expectations. All Rights Reserved.