SECURITY
Protecting you and your customers.
Securing your data is foundational to everything we build, so you can text with confidence and trust that you’ll have one less thing to worry about.
SECURITY
Protecting you and your customers.
Securing your data is foundational to everything we build, so you can text with confidence and trust that you’ll have one less thing to worry about.
SECURITY
Protecting you and your customers.
Securing your data is foundational to everything we build, so you can text with confidence and trust that you’ll have one less thing to worry about.
Secure By Design
We engineer data protection into our platform from the inception of each feature through the product lifecycle—from architecture to deployment to continuous monitoring.
Security and compliance from start to finish.
End to End Encryption.
All data is encrypted in transit to and from our networks, and at rest within our databases.SSO and MFA.
Use or require multi-factor authentication (SMS verification) for more secure logins. Or, set up single sign-on for everyone on your account through Microsoft or Google.High Availability.
Access your data without worry of unauthorized access. We’re 100% cloud-based with redundant servers, built-in retry, auto-scaling, and infrastructure health monitoring.Employee Security Training.
All our employees complete initial, annual, and other periodic training covering internal controls, handling data, security policies, and how to recognize and report social engineering attacks.Ongoing Security Management
Data protection is an ongoing need. So is our work to safeguard you and your customers.
Our security never sleeps, so you can rest easy.
Threat Modeling and Penetration Testing.
Our internal team is continually modeling threats and ensuring we’re protected against them. We hire a third party Red Team annually to probe for security vulnerabilities.Third Party Audits.
We undergo annual and ongoing security audits by external third party auditors.Secure Supply Chain.
We review all platform partners’ rigorous third party audit reports before implementing or updating their services. Partners include Microsoft for cloud computing and storage, Twilio and Bandwidth for carrier connectivity.HIPAA COMPLIANCE
Text Request is designed with HIPAA considerations in mind. We provide tools and features intended to help healthcare organizations meet their HIPAA obligations when using our platform.
SOC2 TYPE 2 CERTIFIED
Our SOC2 Type 2 accreditation certifies that we comply with stringent security, governance, and operational standards. We can provide the third party audit report upon request.
NEXT STEPS
Start texting securely today