Security | Welkin Health


Are you ready to bring order
to your patient chaos?

Contact us today and we’ll help you on your way to streamlined patient management and doing more with your data.

All fields are required to submit form.

Created with Sketch.

Thanks for reaching out! One of our team members will be in touch faster than Weli plunge-diving for anchovies.

We’re redefining patient management with unified communications, data centralization and improved automated workflows all in one powerful platform.

Keeping Your Data Safe is our Top Priority

Secure by design

Every Welkin feature was designed with the availability, integrity, and confidentiality of your data in mind. Our comprehensive security program includes risk analysis, automated testing, external researchers, and much more.

Encryption everywhere

Welkin uses best-in-class encryption to protect your data, whether it’s at rest in our storage systems, in transit within our datacenter, or being delivered to your personal device.

Access controlled

We’ll work with you to understand and apply the principle of least privilege to your business. We’ll make sure that people have access to the information they need, and protect the information they don’t.

Regulation and compliance

Health care is our business. Welkin works with customers regulated under HIPAA, medical device quality management systems, and more.

We're also SOC 2 compliant.

Welkin engages certain third-party data processors (subprocessors) to assist in providing our services. Our subprocessors are chosen with security in mind, and are held to the same rigorous standards we uphold for ourselves. They include:

  • Amazon Web Services, Inc.
  • Mailgun Technologies, Inc.
  • Mode Analytics, Inc.
  • Functional Software, Inc. (Sentry)
  • Sumo Logic, Inc.
  • Twilio, Inc.
  • Zendesk, Inc.

For all customers who have executed Welkin’s DPA, Welkin will provide advance notice of any proposed updates to the list of subprocessors used. We update this list regularly so that you are informed of the scope of subprocessing associated with Welkin’s services.

Think you’ve found a security bug? Just have questions? Contact us at

If you have private feedback for Welkin, please visit our anonymous feedback form.