www.rudder.io Open in urlscan Pro
151.101.2.159  Public Scan

Submitted URL: http://rudder.io/
Effective URL: https://www.rudder.io/
Submission: On February 22 via api from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

Skip to content
 * Platform
   Rudder infrastructure management platform
   Rudder offers the best way  to manage and automate your hybrid infrastructure
    * Overview
    * All features
    * All integrations
   
   Our solutions
    * Configuration management
    * Security management
   
   Get more info
   
 * Use cases
   Use cases
    * Provisioning and deployment
    * Continuous configuration management
   
    * Vulnerability assessment
    * Standard compliance
   
   Customer stories
    * BMW
    * Jaguar Network
   
   
 * Pricing
 * Learn
   Get started
   Rudder offers the best way  to manage and automate your hybrid infrastructure
    * Getting started guide
    * Open source project
    * Our training
   
   Resources
   Rudder offers the best way  to manage and automate your hybrid infrastructure
    * Blog
    * Docs
    * Online demo
   
   Try the enterprise version
    * Twitter
    * Linkedin
    * Mastodon
    * Youtube
    * Github

 * Company
    * About us
    * Team
    * Jobs
    * Press
   
   Free trial

Contact



RUDDER

Manage your infrastructure in a simple, scalable and dynamic way.

Get a demo



CONFIGURATION MANAGEMENT

Automate, deploy and maintain your systems and applications. Using Rudder,
define the desired baseline and configurations, so you can monitor drift and
deploy necessary patches.


CONFIGURATION MANAGEMENT

Automate, deploy and maintain your systems and applications. Using Rudder,
define the desired baseline and configurations, so you can monitor drift and
deploy necessary patches.


SECURITY MANAGEMENT

Based on internal or external policies and vulnerability management, audit and
enforce security across your systems. Easily remediate breaches and drifts.
Ensure and prove the compliance of your infrastructure.


SECURITY MANAGEMENT

Based on internal or external policies and vulnerability management, audit and
enforce security across your systems. Easily remediate breaches and drifts.
Ensure and prove the compliance of your infrastructure.

Know more about Rudder


WHAT DO YOU WANT TO DO WITH RUDDER?

Check out our use cases to learn more about how Rudder enables you to manage
your systems efficiently.

Provisioning & deployment

Continuous configuration management

Standard compliance

Vulnerability assessment



OUR CUSTOMERS




EXPLORE THE FULL POTENTIAL OF RUDDER

Get a free trial


PLATFORM

 * Overview
 * All features
 * Integrations
 * Pricing

SOLUTIONS

 * Configuration management
 * Security management

RESOURCES

 * Rudder docs
 * Rudder blog
 * Online demo

ABOUT

 * Company
 * Jobs
 * Contact us

Github Linkedin Youtube Twitter Mastodon
Platform
 * Overview
 * All features
 * Integrations
 * Pricing

Solutions
 * Configuration management
 * Security management

Resources
 * Rudder docs
 * Rudder blog
 * Online demo

About
 * Company
 * Jobs
 * Contact us

Github Linkedin Youtube Twitter Mastodon
© Rudder (Normation) 2022 Privacy policy Terms of use Security
Scroll to Top

rudder.io


We believe your data is your property and support your right to privacy and
transparency.
Select a Data Access Level and Duration to choose how we use and share your
data.
Necessary Performance All
1 month3 months6 months

We access only the data needed for basic operations. This data is shared with
third parties to ensure that the site is secure and works on your device.

We access data for content personalization and site optimization. Data shared
with third parties may be used to track you and your preferences for this site.

We access data to make ads and media more relevant. Data shared with 3rd parties
may be use to track you on this site and other sites you visit.

Consent Preferences
Use the toggles below to specify your data sharing purposes for this website.
Basic Operations
This type of sharing is necessary for us to access the data we need to make sure
the website is secure and working properly.
Data Accessed:
 * Anonymous data like browser name and version
 * Pseudonymous data like authentication token

Content Personalization
When enabled, you allow us to save your preferences and create a profile about
you so we can deliver personalized content.
Data Accessed:
 * Anonymous data like device type, model and operating system
 * Pseudonymous data like site browsing preferences
 * Personal data like your IP address and location

Site Optimization
When enabled, you allow us to monitor your behavior so we can analyze and
improve the services on our website for all visitors.
Data Accessed:
 * Anonymous data like the address of the previously visited website (HTTP
   Referer)
 * Pseudonymous data like website activity identifiers
 * Personal data like content, search and purchase history

Ad Personalization
When enabled, you allow us access to share data with our advertising partners
that build profiles about you across multiple websites.
Data Accessed:
 * Anonymous data like affiliate referral links
 * Pseudonymous data like identifiers used to track and profile users
 * Personal data like your age, gender and demographics

Protection & Metrics
View your consent record, and the list of 3rd parties blocked and allowed based
on your settings.
Consent Metrics

Consent ID—Date of Consent—Data Access Level—Purpose Categories—Duration of
Consent—

Privacy Protection
Services Blocked
 * Google Analytics
 * Twitter Ads
 * LinkedIn Insights

Services Allowed
 * —

Privacy Paper
Learn more about how we promote privacy and respect your right to control your
data as your property.
Your Data Access Level

You choose the level of data access you want to give to this website, whether
you want the highest level of privacy, or the highest level of personalisation.

 * Necessary Rejects all access and gives you highest level of privacy.
 * Performance Accepts some access and gives you a balanced experience.
 * All Accepts all access and gives you the highest level of personalisation.

Higher levels of access mean that you trust this website to use your data
responsibly.

Your Data Types

Here’s a summary of the data types we may collect about you, and the ways that
data can be used.

 * Anonymous data is data that cannot be used to identify you like device type,
   browser version, and referer or affiliate URL.
 * Pseudonymous data can be used to track you as a UniqueID or UID that is not
   tied directly to your personal information.
 * Personal data can be used to build a profile about you on this and other
   websites, who may use it to identify you.

Benefits of data sharing

Your data access level represents your consent to allow this site to access your
data. Different access levels benefit you in different ways. The lowest level of
access is required to ensure the site works properly and is secure. The second
level of access can make your experience more convenient by allowing this site
to remember your preferences and suggest new products and services based on what
you like. The highest level of access can make your experience more personalised
by helping this site suggest new products and services from this site and other
sites, which may be more relevant to your personal interests.

Higher levels of access enable a better browsing experience for you, and may
also help support this site through advertising revenues.

Know your rights

To comply with the latest data protection laws, this site asks you for consent
per purpose category, which gives you control over which 3rd parties have access
to your data (through cookies or other tracking technologies).

> Consent is presumed not to be freely given if it does not allow separate
> consent to be given to different personal data processing operations.
> 
> — GDPR Recital 43

This site supports your right to privacy and transparency. To comply with rights
afforded to you under the latest data protection laws, this site maintains a
record of your consent and allows you to exercise your rights as a data subject
through the Privacy Contact section below.

> Each controller shall maintain a record of processing activities and shall
> make the record available to the supervisory authority on request.
> 
> — GDPR Article 7

Save my preferences
Customize

Privacy policy