Our dedicated security team leverages industry-accepted best practices and frameworks to secure our systems and your data. Learn more about our security architecture and practices focused on governance, risk management, and compliance.
Our infrastructure takes advantage of the latest technologies to ensure our products are reliable and scale with our customers’ businesses. We maintain a strict maintenance cycle during non-peak hours to ensure consistent, stable delivery. Please visit the MeridianLink Statuspage for real-time updates and consider subscribing to receive pro-active notifications.
Yes. MeridianLink utilizes co-location data centers and public cloud providers to host MeridianLink servers.
Yes. MeridianLink participates in annual SOC 2 and PCI DSS audits.
MeridianLink uses the following methods to encrypt customer data:
MeridianLink leverages a hybrid infrastructure environment. Our products are hosted in on-premises data centers as well as on Microsoft Azure and Amazon Web Services infrastructure across multiple Availability Zones, with a DR site established in a different region. These data centers employ leading physical and environmental security measures, resulting in highly resilient infrastructure.
We maintain a private bug bounty program with a leading provider of crowdsourced ethical hackers. If you find a security vulnerability in any of our products, please submit a report. If you have a security issue or question, please contact us at email@example.com.