The Now Platform® Security enables you to secure your instance, encrypt your data, verify identity, authenticate users, and view your current compliance levels based on application security standards.

Security is built into all levels of the Now Platform. Implement the security features that are appropriate for your organization, from managing failed logins and encrypted password protection, to access control rules and audit logs.

Choose one of these tiles to get started.

Platform security overview infographic

Secure your instance

Security is built into all levels of the Now Platform. Implement the security features that are appropriate for your organization, from managing failed logins and encrypted password protection, to access control rules and audit logs.

vault
ServiceNow Vault
Use the ServiceNow Vault product set of data security tools that protect sensitive information from unauthorized access, corruption, or theft throughout its entire life cycle. Apply protections like encryption, secrets management, and data privacy for the redaction and auditing of sensitive information. The ServiceNow Vault Homepage provides a single, visible place to find and navigate to the ServiceNow Vault data security products.
Security
Reduce risks to sensitive data

Encrypt platform data using the Key Management Framework and Field Encryption Enterprise, which provide key-protection and key lifecycle management for application-level field encryption.

Proxy server
Encrypt data in flight

Encrypt data using a server in your network that encrypts and decrypts sensitive data as it travels between your data center and the ServiceNow cloud.

Handshake
Secure access to your instance

Validate the identity of a user who accesses an instance and authorize the user to features that match the user's role or job function.

Data anonymization
Anonymize Personally Identifiable Information (PII)
Define whether to anonymize all information for all users or for a subset of users. When anonymized, data for the selected user records are replaced with randomized values or values you define. When replacing values, the data structure can be preserved using various techniques. This preservation ensures that data like email addresses or physical addresses are replaced with similarly formatted, but anonymized versions.
Response
Respond to risks fast

Increase security visibility with a real-time dashboard, tailored recommendations, and guided steps for fast remediation to security deficiencies.

Reduce risks to sensitive data using Field Encryption

Conceptual gif demonstrating asymmetric encryption

Field Encryption Enterprise utilizes the Key Management Framework and enables best practice key lifecycle management to customize and manage granular specifications to encrypt and decrypt on your instance. You must purchase a subscription to Field Encryption Enterprise, but the Key Management Framework is available by default for all instances.

Encrypt data in flight using Edge Encryption

Gif showing how the proxy server encrypts data before it leaves the customer network.

Edge Encryption encrypts sensitive data on your company premises before sending it over the internet to your instance (encrypted in transit), where it remains encrypted at rest. Also referred to as client-side encryption, Edge requires all bi-directional user traffic to pass through proxies that are maintained on your infrastructure. You have full control over your key management, as the keys are stored within your proxy on your infrastructure.

Secure access to your instance

Infographic containing multiple types of authentication

Choose the type of authentication that meets your company needs. You can authenticate users, enable single-sign on, authorize web clients to access your instance, and more.

Anonymize Personally Identifiable Information (PII)

Data anonymization overview

Use data privacy to remove personally identifiable information (PII) from user data in a production instance and anonymize data in non-production instances. Ensure that your user data is no longer considered regulated private information.

Respond to risks fast

Instance Security Center example

Monitor the compliance level of instance security controls, view security event monitoring metrics, and configure and maintain instance security settings all from within the Instance Security Center. The Instance Security Center consolidates several key security components into a single control console that helps you detect, protect, and respond to instance-based security events.