Skip to main content

Gliffy by Perforce Security & Compliance Policies

Learn how we’re keeping your information safe so you can diagram with confidence.

Powered by Perforce

Gliffy is owned by Perforce, a longstanding and trusted name in the software industry. Perforce is committed to ensuring data security for customers across all its product offerings, including Gliffy, so you can rest assured that the information contained within your diagrams is safe and secure.

To learn more about Perforce’s data security standards and practices, visit the official Perforce site:

Security at Perforce

Cloud Fortified & SOC 2 Compliant

Gliffy was one of the first apps to achieve Atlassian’s Cloud Fortified designation when the program was introduced in July 2021. Our Cloud apps have also received SOC 2 Type II certification.

These credentials demonstrate our ability to meet enterprise-level standards for reliability, support, and security (including control implementation and validation, risk assessment, testing, and more).

Led by CISO Aaron Kiemele

As the guide for the ongoing maturation of the information security program, Aaron Kiemele is the Chief Information Security Officer (CISO) at Perforce Software. With a technical foundation, Aaron approaches managing an information security program through a foundation of practical, actionable approaches to protecting the confidentiality, integrity, and availability of systems, networks, services, and data.

Aaron’s experience ranges from network engineering to executive leadership roles — including CTO and CISO — with highly regulated industries, which includes healthcare, government, defense, and payment/finance.

With a “Secure by Design and Compliant by Default” approach, Aaron and his team guides the diverse Perforce product lines through their compliance and regulatory obligations. This work is performed with the help of designated liaisons each time, acting as subject matter experts and points of contact to provide tactical support.

Our Data & Security Practices

Personal Information icon

Personal Information

Diagram Data icon

Diagram Data

Bug Bounty Program icon

Bug Bounty Program

Error Capture & Reporting icon

Error Capture & Reporting

Encryption icon

Encryption

Business Continuity Plan icon

Business Continuity Plan

Personal Information icon

Personal Information

Diagram Data icon

Diagram Data

Bug Bounty Program icon

Bug Bounty Program

Gliffy Online