Your data is safe in our hands. Really.

Security best practices are built into every layer of the LogicMonitor experience, from our technical architecture to our everyday business operations.

Security resources

Security whitepaper

Download a deep-dive into our security controls.

Download now
SOC3 Audit report

Review an independent, third-party security audit.

Download now
ISO/IEC certifications

ISO/IEC 27001:2013

ISO/IEC 27017:2015

ISO/IEC 27018:2019

View
SOC2 Type 2 certification

SOC2 Type 2 standards

View certificate

TRUSTED BY THE BEST, WHO NEED THE BEST.

Syngenta logo
John Holland logo
Schneider Electric logo
Cleveland Cliffs logo

Purpose-built security for the hybrid observability and AI era

LogicMonitor’s secure-by-design architecture ensures resilient, compliant, and always-on operations—enabling enterprises to innovate with confidence in a rapidly evolving IT landscape.

Architecture
Data
Operations
GDPR
Validation

Secure architecture

The LogicMonitor product was built by IT security experts.

  • Automatic encryption of sensitive data, both in transit and at rest
  • Strong user authentication controls, including both 2FA and SAML integration
  • Fine-grained role-based access controls allow you to tailor access to your environment to fit your specific needs.
  • Formal security software development lifecycle, with multiple stages of threat modeling and security testing
Security graphic

Secure data collection

The LogicMonitor Collectors you install within your operating environments are designed for optimum security.

  • Collectors initiate only outbound communications to the LogicMonitor platform, secured with TLS encryption.
  • Each Collector is mutually authenticated to your account using modern cryptographic techniques
  • Collectors maintain sensitive data only in-memory and have no inbound network ports vulnerable to attack.

Secure operations

LogicMonitor’s operational platform is protected with best-in-class security.

  • Built on security-hardened Linux servers with perimeter and host-based intrusion prevention systems
  • Multiple levels of redundancy are integrated throughout the service platform to ensure high availability.
  • Operated out of top-tier data centers and AWS regions, all with best-of-breed physical security
Blog -LMBlog_The Modern Data Center

Secure practices

We maintain and use all customer data in alignment with the EU General Data Protection Regulation (GDPR) requirements.

  • Minimal incidental personal data is stored for alert delivery and audit logging purposes only.
  • Device access credentials are encrypted and stored only in memory—never written to disk.
  • Salted one-way hashes are stored in place of user passwords.

Secure standards

The LogicMonitor platform is subject to ongoing third-party validation to ensure the security, availability, and confidentiality of your data.

  • Application penetration testing, conducted by professional security consultancies, ensures that our product remains hacker-proof.
  • AICPA SOC 2 Type 2 audits validate the controls that provide for security, high availability, and data confidentiality.
  • Certification to the ISO 27000 family of standards demonstrates our commitment to holistic information security management across the organization.
Security graphic