Skip to main content

How Geckoboard protects your data

Learn how Geckoboard keeps your data secure with strong security practices and strict compliance.

Updated today

Your data is our most critical asset, and protecting it is our top priority. This page provides an overview of how Geckoboard handles your data, the measures we take to protect it, and the compliance standards we adhere to.

The basics

Geckoboard enables you to create live KPI dashboards that visualize data from your existing tools and data sources.

  • You create connections to services such as Salesforce, Zendesk, Google Sheets, or other data sources using secure authentication.

  • Geckoboard fetches only the data needed to calculate and display your metrics.

  • Your dashboards update automatically so your team always sees current information.

Trusted by thousands of teams

Geckoboard was founded in 2010 in London, and for over 15 years, we’ve helped teams of all sizes track their most important metrics securely. Thousands of customers, including monday.com, Unilever, and PepsiCo, rely on Geckoboard to display live business data.

Compliance and certifications

We take security and privacy seriously, and maintain certifications and regulatory compliance to prove it:

  • Payment Card Industry Data Security Standard (PCI DSS) compliance

  • Cloud Application Security Assessment (CASA) certification

  • General Data Protection Regulation (GDPR) compliance

  • California Consumer Privacy Act (CCPA) compliance

Our privacy compliance is overseen by our Head of Privacy, a certified Data Protection Officer (C-DPO).

We only process what’s needed

Geckoboard follows a data minimization approach. We limit what we collect to what’s directly necessary to display your metrics.

  • In many cases, we process metadata rather than raw content. For example, the Zendesk data source processes specific ticket fields required to power dashboards, rather than entire ticket bodies.

  • On Enterprise plans, granular import controls enable you to choose exactly which fields are imported, allowing you to limit data exposure further.

Your data is encrypted

All data is protected using strong encryption, both in transit and at rest.

  • In transit: All communication between your browser and Geckoboard is encrypted using HTTPS with 256-bit TLS encryption.

  • At rest: Credentials for connected services are encrypted using the AES-GCM cipher with unique 256-bit keys for each service. Passwords are stored using bcrypt.

You control access

Geckoboard provides multiple layers of access control, enabling you to determine who has access to what with:

  • Role-based permissions: Assign users as owners, admins, organization view-only, or dashboard view-only, each with different levels of access.

  • IP restrictions: Limit dashboard access to specific networks and devices.

  • Single Sign-On (SSO): Enterprise plans support SSO with Okta, Azure AD, and other SAML-based identity providers, enabling you to manage Geckoboard access centrally.

Security testing

We validate our security through ongoing internal and external measures:

  • Quarterly vulnerability scans as part of PCI DSS compliance.

  • Annual third-party penetration tests on the application and infrastructure.

  • A bug bounty program that invites security researchers to report vulnerabilities responsibly.

Additional resources

Did this answer your question?