Sign in Book demo

security at gong

Data protection and recovery.
It's top of mind.

Gong prioritizes your security. So you can prioritize your business.

Security operations best practices

Our dedicated security team approaches security holistically based on industry best practices and aligned to a common controls framework. Security threats are prevented using our detections program, secure software development process, and industry-accepted operational practices.

Platform and network security

We perform rigorous security testing including threat-modeling, automated scanning, and third-party audits. If an incident occurs, we resolve the issue quickly using our proven security incident response practices.

Scalability and reliability

Gong’s network infrastructure relies on a secure cloud service platform with flexible capacity to ensure reliability for Gong customers. Customers have access to where they can find up-to-the-minute updates on the operational status of Gong's Reality Platform™.

Security features for more control, visibility and flexibility

Identity and access management Ensure that only the right people can access your company’s data in Gong with features like single sign-on (SSO), SCIM provisioning and granular data access permissions.
Data protection By default, Gong encrypts data at rest and data in transit for all of our customers. Further protect your data with our bring-your-own-key encryption.