Resilient Architecture
Our architecture prioritizes the protection of your data. Leveraging Digital Ocean, a leading cloud service provider, we ensure a highly resilient infrastructure that safeguards your information. With role-based access controls, two-factor authentication, and end-to-end audit trails, we guarantee that access is tightly regulated and aligned with security protocols.Encryption is paramount in our data protection strategy. Utilizing SHA-256-bit encryption with RSA for data at rest, and FIPS 140-2 compliant TLS encryption for data in transit, we maintain the integrity and confidentiality of your data at all times.
Data Isolation and Retention
Our approach to data security is built on the principles of secure design and data isolation. Adhering to secure coding guidelines and OWASP standards, we mitigate threats such as SQL injection and Cross-Site Scripting attacks.Data isolation protocols ensure that each customer's data remains logically separated, preserving confidentiality and integrity. Encryption protocols, both in transit and at rest, guarantee the confidentiality of data transmission and storage, providing peace of mind to our customers.At Togile, we retain your data only for the duration of your usage of our services. Upon trial expiry or subscription cancellation, your data is securely deleted from our servers within 30 days. We retain minimal data, such as leads and deal entries, for user and compliance purposes.
Secured Product Development
Product security is fundamental to our development process. Our Product Roadmap is regularly reviewed to prioritize security fixes, ensuring that security enhancements are integrated at the earliest opportunity. With a DevOps Squad comprising multidisciplinary members, including Product Owners and Quality Assurance experts, we ensure that security is embedded throughout the development lifecycle.Code Review processes, stringent testing protocols, and version control mechanisms guarantee the integrity and security of our codebase. By adhering to secure coding guidelines and conducting thorough code reviews, we minimize vulnerabilities and ensure the robustness of our products.