Our dedicated security team leverages industry-accepted best practices and frameworks to secure our systems and your data. Learn more about our security architecture and practices focused on governance, risk management, and compliance.
We maintain a comprehensive security program designed to protect the confidentiality, integrity, and availability of client data. This includes an annual SOC 2 Type 2 audit and PCI DSS audit. Read our Privacy Policy to learn more about how we secure data.
Our infrastructure takes advantage of the latest technologies to ensure our products are reliable and scale with our customers’ businesses. We maintain a strict maintenance cycle during non-peak hours to ensure consistent, stable delivery. Please visit the MeridianLink Statuspage for real-time updates and consider subscribing to receive pro-active notifications.
Yes. MeridianLink utilizes co-location data centers and public cloud providers to host MeridianLink servers.
Yes. MeridianLink participates in annual SOC 2 and PCI DSS audits.
MeridianLink uses the following methods to encrypt customer data:
MeridianLink leverages a hybrid infrastructure environment. Our products are hosted in on-premises data centers as well as on Microsoft Azure and Amazon Web Services infrastructure across multiple Availability Zones, with a DR site established in a different region. These data centers employ leading physical and environmental security measures, resulting in highly resilient infrastructure.
We maintain a private bug bounty program with a leading provider of crowdsourced ethical hackers. If you find a security vulnerability in any of our products, please submit a report. If you have a security issue or question, please contact us at security@meridianlink.com.
3560 Hyland Ave, Suite #200
Costa Mesa, CA 92626
T: 866-417-5130