Security

Enterprise-level Security

Securely connect and replicate your data using industry-standard security protocols such as SSH tunneling, AWS PrivateLink, IP Allowlisting, and more.
Features

Helping you elevate your data
management experience

Comprehensive Protection for Data and Sensitive Information

Trocco secures data and sensitive information with encryption for in-transit communication and adds protection for connection passwords using AWS Key Management Service (KMS), storing them in internet-isolated databases.
This dual-layer security approach minimizes unauthorized access risks, ensuring robust protection of data integrity and confidentiality.

Isolated and Secure Data Handling

Trocco enhances data security and privacy by initiating a new container for each data transfer, segregating your data from others.
This dedicated environment ensures data integrity and reduces data retention time by terminating the container post-transfer, mitigating data persistence vulnerabilities and enhancing customer data protection.

Advanced Option for Secure External Communication

Trocco meets rigorous security demands with AWS PrivateLink, enabling secure data retrieval and transmission without exposing traffic to the public internet, thus bolstering data security against cyber threats.
Ideal for organizations with strict security policies, it ensures data exchange adheres to the highest standards of security compliance.
Technical Capabilities

Elevate Your Data Workflow and Streamline Analytics with Automated Schema, Custom Templates, and Dynamic Variables

ISO27001 (ISMS) Certification
Trocco adheres to ISO27001 guidelines, ensuring systematic management of sensitive information, assessing and minimizing security risks, demonstrating commitment to data integrity, confidentiality, and availability.
Enhanced Security with Two-Factor Authentication
With Trocco's 2FA feature adds an extra authentication step, significantly reducing unauthorized access risks from compromised passwords and offering a robust defense against phishing, social engineering, and similar security threats.
IP Access-Control List for Precise Access Management
Trocco's IP Access-Control List (ACL) regulates access through IP verification, allowing administrators to define permitted or denied IP addresses, adding a security layer to prevent unauthorized access from outside specified networks.
See other functions

Unlock Comprehensive Data Management: See What else Trocco offers to you

Workflow
(job management)

Complex pipelines are also defined in the GUI. There are plenty of connections necessary for data engineers
See More Details

Data Mart
Generation (ELT)

Just write the conversion process in the SQL editor, and the logs on DWH are easy to use for business.
See More Details

Data Catalog

Eliminate bottlenecks from data understanding to use, and shorten the lead time to problem solving
See More Details

Data check

Flexible testing and verification of data accumulated on DWH is possible.
See More Details

Git and API linkage function

Infrastructure as Code as a data analysis platform. Enhanced API cooperation with external tools
See More Details

Operational support (DevOps)

Development of support functions necessary for the operation of data analysis platforms, such as notifications and re-execution, from the engineer's perspective
See More Details

Web behavior log
collection SDK

Collect website log events with a dedicated SDK and transfer them to your favorite DWH
See More Details

Security

Equipped with functions such as encryption and IP restriction to handle important data
See More Details

Support

A dedicated customer will be in charge and support the response and operation of failures.
See More Details

Data Mart Generation (ELT)

Just write the conversion process in the SQL editor, and the logs on DWH are easy to use for business.
See More Details

Data Mart Generation (ELT)

This feature enables the transformation of data warehouse (DWH) logs into a business-friendly format by simply using an SQL editor for the conversion process. It streamlines the preparation of data marts, making it easier for businesses to analyze and draw insights from their data efficiently.

See More Details

Workflow (job management)

Complex pipelines are also defined in the GUI. There are plenty of connections necessary for data engineers
See More Details

Workflow (job management)

Users can define complex data pipelines through an easy to use graphical user interface (GUI), facilitating easier management of data flows. It supports numerous connector options, making it a versatile tool for data engineers who need to manage and integrate diverse data sources and processes.Scheduled DWH Queries support the regular execution of queries with customizable variables and Slack notifications to keep teams updated. Furthermore, Job Dependencies integrate with workflow functionality to create dependencies for systematic data aggregation post data transfers, optimizing data processing workflows. This comprehensive approach ensures efficient and effective data management and analysis.

See More Details

Data Catalog

Eliminate bottlenecks from data understanding to use, and shorten the lead time to problem solving
See More Details

Data Catalog

This function addresses the challenge of navigating and understanding large datasets by eliminating bottlenecks that slow down the transition from data comprehension to utilization. It effectively reduces the time needed to identify and resolve data-related issues, enhancing overall productivity and decision-making speed.Enhanced table previews offer detailed metadata, summary statistics for data distribution insights, and functionalities like filtering and sorting, streamlining data understanding.The query editor caters to engineers with features like auto-completion, query saving, execution previews, and CSV export options, enabling immediate query writing from anywhere within the data catalog.

See More Details

Data check

Flexible testing and verification of data accumulated on DWH is possible.
See More Details

Data check

Offers the capability for flexible testing and verification of data stored in the data warehouse. This feature ensures the integrity and accuracy of data before it's used for analysis, reporting, or decision-making, contributing to the reliability of data-driven insights for your business. By integrating these checks with workflow functionality, the entire process of data verification and integration is automated, streamlining the monitoring and maintenance of data quality and consistency across platforms.

See More Details

Git and API linkage function

Infrastructure as Code as a data analysis platform. Enhanced API cooperation with external tools
See More Details

Git and API linkage function

This extends the principles of Infrastructure as Code (IaC) to the realm of data analysis platforms, promoting more efficient and reliable setup and management of data infrastructure. By linking data transfer settings with Git in YAML format, users can achieve version control for their configurations, allowing for changes to be reviewed through pull requests by the team. Furthermore, API integration facilitates job execution and status monitoring, with the capability to specify custom variable settings at runtime. It enhances collaboration and integration with external tools through robust API support, streamlining workflows and facilitating automation.

See More Details

Operational Support (DevOps)

Development of support functions necessary for the operation of data analysis platforms, such as notifications and re-execution, from the engineer's perspective
See More Details

Operational Support (DevOps)

Utilizing trocco for all operational tasks streamlines processes significantly, eliminating the need for custom development of functions such as periodic execution and error notifications, which are required when using tools like Embulk. Trocco provides a comprehensive suite of necessary operational functionalities, including team-based management of operational permissions for transfer settings and connection information. Its features support regular, scheduled executions, as well as advanced notification systems through Slack or email, which can be triggered by error counts or execution times, and a mechanism to prevent duplicate job executions in closely scheduled scenarios. This cohesive approach enhances efficiency and reduces the complexity of data operations management.

See More Details

Web behavior log collection SDK

Collect website log events with a dedicated SDK and transfer them to your favorite DWH
See More Details

Web behavior log collection SDK

With a dedicated software development kit (SDK), this tool enables the collection of web logs and event data, which can then be seamlessly transferred to the data warehouse of choice. It's an effective way to gather web analytics data for further analysis and insights. For Example by simply embedding JavaScript tags on your website, you can effortlessly collect essential data for web analysis, including page views (PV), events, and email opening logs, mirroring the comprehensive data collection capabilities of Google Analytics in terms of raw logs, session, and channel definitions. Moreover, these logs can be seamlessly transferred to your preferred Data Warehouse (DWH), provided it is compatible with trocco services, ensuring that your web analytics data is easily accessible for in-depth analysis and decision-making.

See More Details

Security

Equipped with functions such as encryption and IP restriction to handle important data
See More Details

Security

Recognizing the importance of securing sensitive data, trocco ensures stringent security for data and sensitive information, employing encrypted communication for data in transit and AWS KMS for the encryption and isolated storage of sensitive details like connection passwords. It enhances data integrity and privacy by launching a dedicated server, in the form of a new container, for each data transfer, ensuring no data mix-up between different companies' accounts. Post-transfer, containers are destroyed, minimizing customer data retention time. Furthermore, Trocco® meets rigorous security standards by offering AWS PrivateLink for secure, private internet-free communication with external services, catering to those with strict security requirements and seeking additional safeguarding for their data transfers.

See More Details

Support

A dedicated customer will be in charge and support the response and operation of failures.
See More Details

Support

trocco offers comprehensive support to ensure clients can effectively utilize our services, including post-implementation onboarding sessions, assistance with specific inquiries, and error analysis, all included within the advanced plan at no extra charges. This type support structure fosters a seamless user experience, and for more interactive and prompt communication, we provide support channels through Slack and email, available during weekday daytime hours, excluding public holidays and weekends. This approach ensures that users receive timely assistance and guidance, enabling them to maximize the benefits of trocco’s offerings.

See More Details
How it works

Automated data replication architecture

From source to destination, our core functionality automates the extract and load replication process for all of our connectors, so you can enjoy total pipeline peace of mind.
Data Integration/
Ingestion
Begin by swiftly connecting to any data source, enabling the collection of diverse datasets within minutes.
Data Transformation
Convert the ingested raw data into structured business data models that are ready for analysis.
Data Orchestration
Automate and optimize the entire data flow, from initial ingestion to final storage.

Still curious ?

Watch our live demo video to see the platform in action. Witness firsthand how our ETL pipelines can transform your data processes, making them more efficient and effective.
Book a Demo
Book a Demo

Frequently Asked Questions

01.
Why do I need to register my password and other credentials?
Credentials are required to access your databases and cloud storage to retrieve your data. Trocco handles your passwords and authentication information with the utmost care.
02.
As I am entrusting Trocco with sensitive information, is the security aspect of the service safe?
Your confidential information is transferred to our server via encrypted communication and stored in a database isolated from the Internet. Additionally, it is possible to manage user permissions in Trocco, meaning that only the users with administrative privileges can create and share your connection information. General users can use connection information shared with them, without being able to view the credentials.

TROCCO is trusted partner and certified with several Hyper Scalers