TigerData Enterprise: how do I contact sales for SOC 2/HIPAA, SSO, private networking, and SLAs?
Time-Series Databases

TigerData Enterprise: how do I contact sales for SOC 2/HIPAA, SSO, private networking, and SLAs?

6 min read

Teams looking at TigerData Enterprise are usually solving real production requirements: SOC 2 and HIPAA, SSO for access control, private networking for data isolation, and clear SLAs for uptime and support. All of that is available on TigerData’s higher plans, but anything compliance- or security-sensitive goes through a direct conversation with sales and solutions engineering.

Quick Answer: To discuss SOC 2/HIPAA, SSO, private networking, and SLAs for TigerData Enterprise, contact the TigerData sales team via the contact form or email sales@tigerdata.com. From there, they’ll scope your enterprise requirements, share security/compliance documentation (like SOC 2 reports), and propose the right plan and networking model.

The Quick Overview

  • What It Is: A direct, guided sales and solutions-engagement path for organizations that need TigerData Enterprise features like SOC 2 Type II, HIPAA support, SSO, private networking, and formal SLAs.
  • Who It Is For: Teams running regulated, production, or large-scale telemetry workloads (IoT, fintech, health, industrial, Web3) that must prove compliance and secure their Postgres infrastructure.
  • Core Problem Solved: You need a Postgres-native telemetry platform that meets strict security, compliance, and uptime requirements—without guessing which plan you need or navigating security questions alone.

How It Works

TigerData’s Enterprise engagement is straightforward: you outline your security and compliance requirements, and the sales + solutions team maps those requirements to the right Tiger Cloud plan, network topology, and support model.

  1. Initial contact:

    • Use the TigerData contact page and select a sales/enterprise inquiry, or email sales@tigerdata.com.
    • Briefly describe what you need: SOC 2 report, HIPAA, SSO, private networking options, SLAs, and any regulatory frameworks (e.g., GDPR, CCPA) that matter to you.
  2. Requirements + security/compliance review:

    • The team will schedule a call to walk through:
      • Compliance needs: SOC 2 Type II access, HIPAA (Enterprise-only), GDPR support, CCPA.
      • Identity and access: SSO, MFA, RBAC expectations.
      • Network boundaries: VPC peering, private networking, IP allow lists.
      • Availability and recovery: HA replicas, backup cadence, point-in-time recovery (PITR), and SLAs.
    • For qualified prospects, TigerData can share relevant security and compliance documentation under NDA (for example, SOC 2 report access is available on Scale and Enterprise).
  3. Plan selection, pricing, and onboarding:

    • Based on your usage profile and risk posture, the sales team will recommend a plan (usually Scale or Enterprise for SOC 2/HIPAA/SSO/private networking).
    • You’ll get a clear proposal: plan, infrastructure model, SLAs, support level, and pricing with transparent line items (no per-query or backup fees).
    • Once accepted, TigerData provisions your Tiger Cloud environment and guides you through secure onboarding (SSO setup, networking configuration, data migration).

Features & Benefits Breakdown

Core FeatureWhat It DoesPrimary Benefit
SOC 2 Type II accessProvides audited controls for security, availability, and operations on Tiger Cloud Scale/Enterprise.Lets you satisfy vendor due diligence and internal risk reviews with a formal SOC 2 report.
HIPAA support (Enterprise)Enables HIPAA-aligned controls and agreements for handling PHI on Enterprise.Allows covered entities and partners to run healthcare workloads on TigerData.
SSO, MFA, and access controlsCentralizes authentication, enforces MFA, and controls access via enterprise identity.Reduces account sprawl and tightens access management for production databases.
Private networking & SLAsConnects your systems over secure, private links (e.g., VPC peering) with defined uptime and response SLAs.Ensures predictable performance, isolation, and support for mission-critical workloads.

Ideal Use Cases

  • Best for regulated environments: Because you can pair TigerData’s Postgres-native telemetry engine with SOC 2 Type II, GDPR support, and HIPAA on Enterprise—making it fit for healthcare, finance, and other regulated sectors.
  • Best for mission-critical telemetry at scale: Because you can combine high availability, automated backups, point-in-time recovery, and formal SLAs with private networking and SSO, so your real-time metrics and events platform meets both reliability and security standards.

Limitations & Considerations

  • Plan requirements: SOC 2 Type II report access is available on Tiger Cloud Scale and Enterprise plans; HIPAA support is explicitly an Enterprise feature. Important: if you need HIPAA, you must be on Enterprise and sign the appropriate agreements.
  • Custom security needs: If you require bespoke controls (special data residency, custom networking patterns, or non-standard SLAs), those are not “self-serve.” They’re evaluated case by case through the sales and solutions process.

Pricing & Plans

TigerData keeps pricing transparent: you pay for the service capacity (compute, storage, throughput) and plan level, not per query, backup, or hidden egress/ingest fees. Automated backups and similar safety features are included; they’re not separate line items.

Most SOC 2/HIPAA/SSO/private networking conversations end up on higher plans:

  • Scale Plan: Best for teams that already run serious production telemetry workloads and need SOC 2 Type II access, GDPR support, and production-ready operations (HA, PITR), but may not require HIPAA or highly bespoke terms.
  • Enterprise Plan: Best for organizations that need HIPAA, advanced security posture (e.g., private networking models, additional approvals), strict SLAs, and potentially JOIN services (Jumpstart Onboarding and INtegration) for complex migrations.

For exact pricing, multi-region topology, and contract details, you’ll need to contact sales directly so they can align cost with your ingest rates, data volume, and availability requirements.

Frequently Asked Questions

How do I start an Enterprise conversation about SOC 2, HIPAA, SSO, private networking, and SLAs?

Short Answer: Use the TigerData contact form or email sales@tigerdata.com with a brief description of your security and compliance needs.

Details:
In your message, call out the specific items you care about—SOC 2 Type II, HIPAA (if applicable), SSO, private networking, SLAs—plus any regional or regulatory constraints (GDPR, CCPA, etc.). The TigerData team will respond with a time for an intro call, share high-level documentation, and then walk through architecture and plan options. For organizations evaluating multiple vendors, they can also align their responses with your standard security questionnaire or RFP process.

Which TigerData plans support SOC 2, GDPR, and HIPAA?

Short Answer: SOC 2 Type II reports are available on Tiger Cloud Scale and Enterprise; GDPR support is standard; HIPAA is available on Enterprise.

Details:
TigerData maintains a robust security posture across its managed offerings, including encryption in transit and at rest, MFA, and production-ready operations (HA, automated backups, point-in-time recovery). For compliance:

  • SOC 2 Type II: The report is available to customers on Scale and Enterprise plans, typically under NDA.
  • GDPR: TigerData fully complies with GDPR; related data-subject requests are handled via support.
  • HIPAA: HIPAA support is explicitly offered for Enterprise subscribers, with the appropriate contractual and technical controls.

If you’re unsure where your requirements land, sales can help you map your risk and regulatory profile to the right plan.

Summary

If you’re evaluating TigerData for a regulated or mission-critical environment, you’ll want clarity on SOC 2, HIPAA, SSO, private networking, and SLAs before you commit. Those capabilities live in TigerData’s Scale and Enterprise offerings, with HIPAA reserved for Enterprise, and they’re always paired with concrete operational controls: MFA, encryption at rest and in transit, private networking, high availability, automated backups, and point-in-time recovery. The fastest way to confirm fit is a direct conversation with sales and solutions engineering.

Next Step

Get Started