JetBlue extends partnership with FLYR, doubling down on AI-driven travel intelligence Arrow

Tech Blog / FLYR’s Uncompromising Approach to the Highest Data Security Standards

FLYR’s Uncompromising Approach to the Highest Data Security Standards

At FLYR, we love data and leverage it as much as possible to enable industry-leading outcomes for our customers. Our customers entrust us with the use of massive volumes of data, and we treat that data with the highest fidelity of data security and privacy. This includes where we store that data.

How data is cared for can greatly depend on the local governance rules for the region in which we store the data. Of course, we pick the most stringent rules – without compromise. And we hand-pick specific combinations of data storage locations per airline customer to balance the need for data protection governance against performance and reliability.

How does FLYR protect customer data?

When we receive data, we go straight for full encryption – both in situ and in transit.

There are two aspects to our data encryption strategy. One is protecting the data from the place of origin so that only authorized recipients can access the content. At the same time, recipients can also be assured that the content is created by the senders they trust. We also protect the transmission of the data over the internet with industry-standard encryption, so that no one else will be able to eavesdrop on the content.

We store our customer data in separate domains so that data is not commingling, and we never leverage one customer’s data to use it on another’s. We keep each set of customer data very securely in its own protected area, and we don’t share data across different clients without their permission. There is never a risk that an airline could give FLYR its data and have it fall accidentally into a rival’s hands, for example, through human error.

Managing and protecting data in transit

The other part of the encryption strategy, called data in transit, protects the data when it is being moved from one place to another. In this instance, we use encryption along the way so there cannot be any eavesdropping on the line, for example. This ensures end-to-end encryption with both the data at rest and data in transit. Nobody can eavesdrop on it and then pick up what the content is until it reaches a place within our four walls. Then we decrypt it and process it internally.

So how does this give FLYR an advantage? Many of our competitors’ solutions are actually held in-house – what we call on-premise solutions. They are located within the airline itself, on the airline’s servers – they don’t move data around outside the airline. So data security was focused around internal employee access control. FLYR, however, has been built with a cloud-first mentality since the start. This means that FLYR is compliant with the most stringent SOC 2 cloud-based storage regulations for online companies.

This all comes back to the way we’ve built our cloud from the beginning, putting data security front and center. Only then can the front end deliver – with accuracy and authentically – the most advanced revenue management and commercial insight solutions for FLYR’s airline customers.

Similar stories

Open source, both as an idea and as software, is at the heart of what we do at FLYR, including in our marketing technology engineering department.
As part of our responsibilities as data engineers on a team focused on delivering key customer metrics, the FLYR Cloud team challenges ourselves to build flexible ways of managing our pipelines.
FLYR’s engineering team estimates new pricing strategy outcomes before production to ensure the most successful models are deployed.