Our platform is built on an Azure Cloud. Security is our highest priority at Meru Data. We protect your data with tight access controls, strong firewalls, and global data centers. And our infrastructure has been certified by independent third parties.  

Meru offers the control needed to prevent unauthorized access to your data -  

  • Data is protected with encryption, audit logs, firewalls. 

  • Password policies with strong password requirements 

  • Multi factor authentication for added security. 

  • Data encryption at rest and in transit  

  • Role Based Access Control 

  • Continuous monitoring 

Our security program has been developed and run-in compliance with a number of industry standards. Complying with well-known industry standards is an integral part of our approach to security because we understand they provide independent assurance to our customers that Meru’s security program meets a baseline of security controls. 


Azure Data Center 

Meru is hosted in Azure, a scalable cloud computing platform with high availability and dependability, and versatility. The Azure global infrastructure is designed and managed according to security best practices as well as a variety of security compliance standards. Protecting this infrastructure is Microsoft’s number one priority, and Azure provides several reports from third-party auditors who have verified its compliance with a variety of security standards and regulations. 

reliability vector created 2.png


We are committed to delivering products that are stable and secure at scale. Our cloud infrastructure takes advantage of scale, multi-level redundancy, and failure options across regions to reduce latency, maintain reliability, and scale with your organization's needs. 

Meru offers reliability to prevent any disruption in service  

  • Business Continuity and Disaster Recovery programs   

  • Preventing possible points of failure by implementing controls at every point of the software development lifecycle 

  • Improve product and platform performance by monitoring key performance metrics, such as load times, search responsiveness on a continuous basis. 



Our internal privacy processes and procedures are documented transparently, so you can rest assured your data is handled with the utmost care.