Synthetic Monitoring

Simulate visitor interaction with your site to monitor the end user experience.

View Product Info

FEATURES

Simulate visitor interaction

Identify bottlenecks and speed up your website.

Learn More

Real User Monitoring

Enhance your site performance with data from actual site visitors

View Product Info

FEATURES

Real user insights in real time

Know how your site or web app is performing with real user insights

Learn More

Infrastructure Monitoring Powered by SolarWinds AppOptics

Instant visibility into servers, virtual hosts, and containerized environments

View Infrastructure Monitoring Info
Comprehensive set of turnkey infrastructure integrations

Including dozens of AWS and Azure services, container orchestrations like Docker and Kubernetes, and more 

Learn More

Application Performance Monitoring Powered by SolarWinds AppOptics

Comprehensive, full-stack visibility, and troubleshooting

View Application Performance Monitoring Info
Complete visibility into application issues

Pinpoint the root cause down to a poor-performing line of code

Learn More

Log Management and Analytics Powered by SolarWinds Loggly

Integrated, cost-effective, hosted, and scalable full-stack, multi-source log management

 View Log Management and Analytics Info
Collect, search, and analyze log data

Quickly jump into the relevant logs to accelerate troubleshooting

Learn More

The security and privacy of your data are critically important to SolarWinds.

Protecting your data is very important to SolarWinds and the Pingdom team.

You are placing your trust in SolarWinds® Pingdom®, so we want you to know we’ve implemented strong security standards both within the product and outside with operational processes, using industry standards that will protect your data today and into the future.

Below are some details specific to data protection and retention that we think will answer many of the questions you might have about how we’ve implemented data protection within Pingdom. At the bottom of the page, we’ve also provided a link to the detailed SolarWinds security that blankets all of our products.

Data Protection

What encryption algorithms are used to protect customer data?

  • All the primary Pingdom databases are encrypted. Encrypted DB instances use the industry standard AES-256 encryption algorithm and the encryption key is protected by FIPS 140-2 validated cryptographic modules.
  • Data in transit will use TLS 1.2 or above and AES256 for data at rest.

Additional encryption for transaction monitoring

  • Inputs such as username/password in our multi-step recorded synthetic tests (what we call “transaction monitoring”) are stored encrypted.

Are customers provided with the ability to generate a unique encryption key?

  • No. All data sent to the Pingdom monitoring service is stored in an encrypted database. This includes any backup data. Encryption keys to the database are centrally managed by the Pingdom Service Reliability and Engineering (SRE) team. Authorized requests to read data are decrypted on the fly as the data is needed. Access level management to sensitive systems are limited to a restricted number of authorized Pingdom personnel.

What additional safeguards are in place to protect user credentials beyond the use of basic encryption?

  • Credentials are stored through a one-way hash function. Access controls to sensitive data in our databases, systems, and environments are set on a need-to-know/least privilege necessary basis. Access control lists define the behavior of any user within our information systems, and security policies limit them to authorized behaviors.

Are data segmentation and separation capability between clients provided?

  • All data in Pingdom is tagged with the Pingdom account ID. All access requests carry this information on the active user and the organization to which the user belongs. The Pingdom platform authorizes these requests using software-enforced policies.

What data will you be storing about us?

  • We only collect data that is necessary for running our service and provided by our customers. This type of data primarily includes billing information and monitoring configuration.

How do you ensure production data is never used in a development or test environment?

  • Our production and test environments are completely isolated (air-gapped).

Do you comply with security laws and regulations?

  • You can use Pingdom in environments regulated by PCI, HIPAA, and EU data protection. We validated our security processes and services through an independent third-party in a SOC 2 Type 1 audit. For more on how we meet the requirements for GDPR, please visit our GDPR resource center.

Data Retention

Do you have a data retention policy?

  • There are documented retention and destruction policies and procedures. The organization creates, protects, and retains information system audit records based on customer requirements (depending on data source and applicable regulations) to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.

How long will data about our organization be kept following a contract termination?

  • Data is retained according to SolarWinds’ internal data retention policies and destruction schedule. As part of GDPR, customers are, however, entitled to request earlier purging of data by contacting customer support.

Questions and more security info

For more details on SolarWinds and Pingdom security please view the SolarWinds Security Statement.

Please don’t hesitate to reach out and ask us about any security questions or concerns you might have. Email us at support@pingdom.com.

Start monitoring your website’s availablity

START FREE TRIAL BUY NOW

Let’s talk it over.
Contact our team. Anytime.

855-679-0752

Start monitoring for free