- Getting Started
- Using Hevo
-
Pipelines
- Familiarizing with the Pipelines UI
- Pipeline Concepts
- Working with Pipelines
- Transformations
-
Schema Mapper
- Using Schema Mapper
- Mapping Statuses
- Mapping a Source Event Type with a Destination Table
- Mapping a Source Event Type Field with a Destination Table Column
- Resizing String Columns in the Destination
- Fixing Unmapped Fields
- Resolving Incompatible Schema Mappings
- Bulk Actions in Schema Mapper
- Auto Mapping Event Types
- Creating File Partitions for S3 Destination through Schema Mapper
- Schema Mapper Compatibility Table
- Sources
- Destinations
- Transform
- Activate
- Concepts and Reference
- Account Management
- About Hevo
- FAQs
-
Release Notes
- Release Version 1.57 (22-Feb-2021)
- Release Version 1.56 (09-Feb-2021)
- Release Version 1.55 (25-Jan-2021)
- Release Version 1.54 (12-Jan-2021)
- Release Version 1.53 (22-Dec-2020)
- Release Version 1.52 (03-Dec-2020)
- Release Version 1.51 (10-Nov-2020)
- Release Version 1.50 (19-Oct-2020)
- Release Version 1.49 (28-Sep-2020)
- Release Version 1.48 (01-Sep-2020)
- Release Version 1.47 (06-Aug-2020)
- Release Version 1.46 (21-Jul-2020)
- Release Version 1.45 (02-Jul-2020)
- Release Version 1.44 (11-Jun-2020)
- Release Version 1.43 (15-May-2020)
- Release Version 1.42 (30-Apr-2020)
- Release Version 1.41 (Apr-2020)
- Release Version 1.40 (Mar-2020)
- Release Version 1.39 (Feb-2020)
- Release Version 1.38 (Jan-2020)
Regulatory Compliance
ON THIS PAGE
Hevo Data Inc. is committed to ensuring the privacy and confidentiality of all the user data processed by our systems and applications.
HIPAA Compliance
At Hevo, we have implemented physical, network, and process security measures to ensure the security and confidentiality of customer data, as outlined in the Health Insurance Portability and Accountability Act (HIPAA) .
SOC2 Compliance
Hevo applications securely manage your data to protect the interests of your organization and the privacy of your clients. Every solution designed at Hevo manages customer data based on the five SOC “trust services criteria” — security, availability, processing integrity, confidentiality, and privacy. Read about System and Organization Controls (SOC) Suite of Services .
See Also
Was this page helpful?
Thank you for helping improve Hevo's documentation. If you need help or have any questions, please consider contacting support.