Secure by design.

Glean was built from the ground up by an experienced team with security, privacy, and compliance prioritized from day one.

Built with modern security foundations.

Glean was developed following modern security principles, including the zero trust security model, strong authentication practices, the principle of least privilege, and the shift-left approach to incorporating security into design, development, and operations.

Meets the highest industry standards.

Soc 2 Type II Certified

The most comprehensive certification that our system is designed to keep our customers’ sensitive data secure.

Secure encryption of data

All customer data is encrypted at rest with FIP 140-2 validated crypto module utilizing AES 256 bit encryption. All data in transit is encrypted using TLS 1.2+. 

GDPR compliant

Customers’ personal information is maintained and secured in accordance with the EU's General Data Protection Regulation (GDPR).

Designed to protect your company’s data.

Authenticated search

All Glean access requires authentication via your enterprise’s identity provider. Leverage your existing SSO setup.

Indexing controls

Control what data Glean crawls and indexes. Prevent Glean from surfacing results for certain search terms.


Strict permissions enforcement

Glean only shows you the information you already have permission to access in the source application. If any permissions change, Glean’s results reflect those changes immediately. 

In sync with source applications

Content is always in sync with your source applications, so existing GDPR and CCPA processes work as they are.

Single tenant

All your data is only in your own GCP project.

Hosting options

You choose whether you run Glean on-premise or in the cloud.

Audit logging

Access comprehensive and configurable audit logging of your company’s Glean usage. Export audit logs to your SIEM for monitoring and alerting.


Encryption of all data

All data is encrypted at rest using AES 256. All data is encrypted in transit using TLS 1.2+. Controls are in place to limit data exfiltration risks.

Report security findings.

If you believe you have found a security vulnerability in Glean's product offering, please email your finding to You can also email us with any questions regarding Glean’s security.

Trusted by leading companies

Workplace search that actually works.
Get a Demo