SECURITY

Protecting you and your customers.

Securing your data is foundational to everything we build, so you can text with confidence and trust that you’ll have one less thing to worry about.

SECURITY

Protecting you and your customers.

Securing your data is foundational to everything we build, so you can text with confidence and trust that you’ll have one less thing to worry about.

SECURITY

Protecting you and your customers.

Securing your data is foundational to everything we build, so you can text with confidence and trust that you’ll have one less thing to worry about.

Secure By Design

We engineer data protection into our platform from the inception of each feature through the product lifecycle—from architecture to deployment to continuous monitoring.

Security and compliance from start to finish.

End to End Encryption.
All data is encrypted in transit to and from our networks, and at rest within our databases.
SSO and MFA.
Use or require multi-factor authentication (SMS verification) for more secure logins. Or, set up single sign-on for everyone on your account through Microsoft or Google.
High Availability.
Access your data without worry of unauthorized access. We’re 100% cloud-based with redundant servers, built-in retry, auto-scaling, and infrastructure health monitoring.
Employee Security Training.
All our employees complete initial, annual, and other periodic training covering internal controls, handling data, security policies, and how to recognize and report social engineering attacks.

Ongoing Security Management

Data protection is an ongoing need. So is our work to safeguard you and your customers.

Our security never sleeps, so you can rest easy.

Threat Modeling and Penetration Testing.
Our internal team is continually modeling threats and ensuring we’re protected against them. We hire a third party Red Team annually to probe for security vulnerabilities.
Third Party Audits.
We undergo annual and ongoing security audits by external third party auditors.
Secure Supply Chain.
We review all platform partners’ rigorous third party audit reports before implementing or updating their services. Partners include Microsoft for cloud computing and storage, Twilio and Bandwidth for carrier connectivity.

HIPAA COMPLIANCE

Text Request HIPAA accounts meet the security, governance, and operational requirements specified by the US Department of Health & Human Services and the Health Insurance Portability and Accountability Act. Using our HIPAA accounts, you can send and receive PHI safely and compliantly.

SOC2 TYPE 2 CERTIFIED

Our SOC2 Type 2 accreditation certifies that we comply with stringent security, governance, and operational standards. We can provide the third party audit report upon request.

NEXT STEPS

Start texting securely today