top of page
New York Office


At Meru Data, your security is of paramount importance. We ensure that your data is protected with tight access controls, strong firewalls, and state-of-the-art global data centers. We take security by design approach to protecting your data and have built our software using best practices for highly available, scalable, and secure cloud applications.

Physical Security 

Our infrastructure has been certified by reputable independent third parties. The Meru platform is hosted on Azure Cloud, which offers high availability, dependability, and versatility.  

Application Security

Our security program has been developed and run in compliance with a number of industry standards. 


Our security program has been developed and run in compliance with a number of industry standards. Complying with well-known industry standards is an integral part of our approach to security. These standards provide independent assurance to our customers that Meru’s security program meets a baseline of security controls.



We are committed to delivering products that are stable and secure at scale. Our cloud infrastructure takes advantage of scale, multi-level redundancy, and failure options across regions to reduce latency, maintain reliability, and scale with your organization's needs. 


Meru offers reliability to prevent any disruption in service 

  • Business Continuity and Disaster Recovery programs 

  • Preventing possible points of failure by implementing controls at every point of the software development lifecycle 

  • Improve product and platform performance by monitoring key performance metrics, such as load times and search responsiveness on a continuous basis.  

Click on the link below to access our Privacy Policy​


Our internal privacy processes and procedures are documented transparently, so you can rest assured your data is handled with the utmost care.

Meru Data is ISO 27001:2013

Certifications and attestations

Meru Data is ISO 27001:2013 certified. We employ industry-standard technological measures that are reasonably designed to help protect your personal information from loss, unauthorized access, disclosure, alteration, or destruction.

bottom of page