Relativity named a CSO50 winner for outstanding business value and thought leadership in security. Hear from Our CSO

Relativity Trust

Security is our priority, so e-discovery can be yours.

In today’s ever-evolving threat landscape, keeping your data secure takes around-the-clock protection that’s tough to maintain. And when a cyberattack happens, the cost to your company will be widespread and unpredictable—from millions of dollars in fines and expenses to long-lasting reputational damage.

That’s why thousands of organizations trust Relativity with their most sensitive e-discovery data. We take every precaution to protect your data in a secure, performant system, monitored 24/7 by a team of top security experts.

Threat Prevention

We use advanced technology to analyze billions of data points, gain insight into cyberattack trends, and stop attacks before they happen. Our security team, Calder7, leads the charge with a skilled crew of engineers, analysts, and subject matter experts tasked with protecting our customer’s data.

RelativityOne Threat Prevention

Automated Security Processes

To achieve the ideal balance between accuracy and speed, we’ve implemented automated security procedures that maximize the effectiveness of our technology, processes, and people.

RelativityOne Automated Security Processes

Security Insights

Sharing valuable cyber information with customers and the industry comes with the territory. That’s why we work hand in hand with our community to create a united front against threat actors.

RelativityOne Security Insights


We have independently achieved ISO 27001:2013, SOC-2 Type II, and HIPAA compliance for our Information Security Management System (ISMS) program. We ensure data security and privacy through our aggressive standards.

RelativityOne Compliance

The average cost for a data breach is

$3.92 million and climbing.

With RelativityOne’s security features, you don’t have to stress.

  • Single and Multi-Factor Authentication
  • 24/7 Monitoring
  • Encryption At-Rest and In-Transit
  • Secure Coding
  • Penetration Testing
  • Vulnerability Management
  • Customer Lockbox
  • Customer-Managed Keys
  • Shared Security Logs
  • Secure Operations
  • Incident Management

Resources You Might Like:

Relativity Trust: Understanding Security in RelativityOne

Learn why a comprehensive security program is essential to protecting your data.

GDPR & Other Privacy Laws

Protecting personal and confidential data is fundamental to our business. Read our privacy policies.

How to Maximize Cybersecurity While Working Remotely

Keeping a remote workforce secure takes vigilance. Learn how to build a fortress around your data with these tactics.