Skip to main content

Gliffy by Perforce Security & Compliance Policies

Learn how we’re keeping your information safe so you can diagram with confidence.

Perforce

Powered by Perforce

Gliffy is owned by Perforce, a longstanding and trusted name in the software industry. Perforce is committed to ensuring data security for customers across all its product offerings, including Gliffy, so you can rest assured that the information contained within your diagrams is safe and secure.

To learn more about Perforce’s data security standards and practices, visit the official Perforce site:

Trust Center Security at Perforce

Enterprise Security

ISO 42001 Certified & SOC 2 Compliant

Gliffy was among the first apps to earn Atlassian’s Cloud Fortified status and achieve ISO 42001 certification—one of the world’s first international standards for responsible AI management. In addition, our Cloud apps are SOC 2 Type II compliant, underscoring our ongoing commitment to enterprise‑grade security and trust.

These credentials demonstrate our ability to meet enterprise-level standards for reliability, support, and security (including control implementation and validation, risk assessment, testing, and more).

Aaron Kiemele

Led by CISO Aaron Kiemele

As the guide for the ongoing maturation of the information security program, Aaron Kiemele is the Chief Information Security Officer (CISO) at Perforce Software. With a technical foundation, Aaron approaches managing an information security program through a foundation of practical, actionable approaches to protecting the confidentiality, integrity, and availability of systems, networks, services, and data.

Aaron’s experience ranges from network engineering to executive leadership roles — including CTO and CISO — with highly regulated industries, which includes healthcare, government, defense, and payment/finance.

With a “Secure by Design and Compliant by Default” approach, Aaron and his team guides the diverse Perforce product lines through their compliance and regulatory obligations. This work is performed with the help of designated liaisons each time, acting as subject matter experts and points of contact to provide tactical support.

Our Data & Security Practices

Gliffy Online