logo

Data Security

Resilient Architecture

Our architecture prioritizes the protection of your data. Leveraging Digital Ocean, a leading cloud service provider, we ensure a highly resilient infrastructure that safeguards your information. With role-based access controls, two-factor authentication, and end-to-end audit trails, we guarantee that access is tightly regulated and aligned with security protocols.Encryption is paramount in our data protection strategy. Utilizing SHA-256-bit encryption with RSA for data at rest, and FIPS 140-2 compliant TLS encryption for data in transit, we maintain the integrity and confidentiality of your data at all times.

Data Isolation and Retention

Our approach to data security is built on the principles of secure design and data isolation. Adhering to secure coding guidelines and OWASP standards, we mitigate threats such as SQL injection and Cross-Site Scripting attacks.Data isolation protocols ensure that each customer's data remains logically separated, preserving confidentiality and integrity. Encryption protocols, both in transit and at rest, guarantee the confidentiality of data transmission and storage, providing peace of mind to our customers.At Togile, we retain your data only for the duration of your usage of our services. Upon trial expiry or subscription cancellation, your data is securely deleted from our servers within 30 days. We retain minimal data, such as leads and deal entries, for user and compliance purposes.

Secured Product Development

Product security is fundamental to our development process. Our Product Roadmap is regularly reviewed to prioritize security fixes, ensuring that security enhancements are integrated at the earliest opportunity. With a DevOps Squad comprising multidisciplinary members, including Product Owners and Quality Assurance experts, we ensure that security is embedded throughout the development lifecycle.Code Review processes, stringent testing protocols, and version control mechanisms guarantee the integrity and security of our codebase. By adhering to secure coding guidelines and conducting thorough code reviews, we minimize vulnerabilities and ensure the robustness of our products.

Physical Security

Workplace Security

We employ stringent physical security measures to protect our premises and data centers. Access controls, CCTV surveillance, and monitoring mechanisms guarantee the integrity and confidentiality of our physical assets. Our data centers, located in secure facilities, are equipped with redundant power and cooling systems to ensure uninterrupted service delivery.

Data Center Security

Togile's dedicated VPCs are hosted within MongoDB Data Cloud's secure infrastructure. Access to Google's data center floor is strictly regulated, with multi-factor access control implemented using security badges and biometrics. Google's data center physical security features a layered model, including electronic access cards, alarms, perimeter fencing, and biometric authentication, ensuring comprehensive protection.

Operational Security

At Togile, organizational security is paramount. Our Information Security Team (IST) is dedicated to addressing security objectives and mitigating risks across all stakeholders. Strict policies and procedures govern the security, availability, and confidentiality of customer data, ensuring comprehensive protection.

Logging and Monitoring

Employee Background Checks and ongoing Security Awareness initiatives underscore our commitment to maintaining a secure workforce. With dedicated security and privacy teams, we continuously monitor and manage our security programs, providing specialized expertise and guidance to our engineering teams.Internal Audit and Compliance processes ensure adherence to standards and facilitate independent assessments by third parties, ensuring transparency and accountability in our security practices.

Platform Load Balancing

Our load balancers and auto-scaling of service nodes ensure continuous and secure access to services globally, optimizing performance and reliability.

Data Backup

Client databases are replicated across multiple availability zones in near real-time. Nightly backups are taken for each customer's data, encrypted, and stored within Google Cloud buckets. In the event of data recovery requests within the retention period, we promptly restore data with secure access, depending on data size and complexity.

Incident and Response Management

Togile maintains an in-house Incident Response (IR) program to detect and respond to security incidents promptly. Our security team guides employees on reporting suspicious activity, ensuring timely incident response, risk assessment, and communication with stakeholders to mitigate risks effectively.

Organizational Security

At Togile, safeguarding security and privacy is paramount. We uphold stringent measures and hold certifications such as ISO 27001:2013 and SOC2, backed by regular audits. Our information classification and handling guidelines are meticulously adhered to by all team members.

Employee Background Checks

We enlist reputable external agencies to conduct comprehensive background checks for every new hire. This process meticulously verifies criminal records and previous employment history. Until clearance is obtained, employees are not assigned any tasks or granted access to information that could jeopardize the safety of our customers or team.

Security Awareness and Training

Each employee undergoes rigorous training in information security, privacy, and compliance. They are also educated on incident response protocols and effective communication methods. Additional security training may be provided based on their role, including configuring and managing client services or cloud environments.Internal events and quizzes are hosted to ensure employees stay abreast of industry requirements, keeping their knowledge up-to-date.

Dedicated Security Team

We boast a dedicated security team tasked with fortifying the company's infrastructure and applications against potential threats. They conduct regular upgrades to mitigate security risks and provide specialized training to developers and consulting teams, emphasizing adherence to secure coding practices and protocols.

Endpoint Security

All workstations are configured to encrypt data at rest, ensuring data integrity. Removable media sources are strictly prohibited within our office premises. Additionally, two-factor authentication is enforced across all applications and access points. Employees are required to maintain strong passwords and update them regularly to enhance security measures.

Vendor Management

Togile carefully selects vendors and sub-processors that align with stringent security standards and GDPR guidelines. Prior verification of security and privacy policies ensures the integrity and confidentiality of our services.We rigorously evaluate and monitor our vendors to ensure alignment with our security standards and commitments. Through periodic reviews and assessments, we ensure the effectiveness of our vendors' security measures, maintaining the integrity and confidentiality of our services.

Customer Controls & Security

While Togile provides robust security measures, customers play a vital role in maintaining account security. Implementing strong passwords, multi-factor authentication, and regular software updates are essential steps to enhance security. Additionally, customers should remain vigilant against phishing and malware threats, ensuring the integrity of their data and accounts.

Your customer data is in safe hands

Encrypt your all data with Togile and keep it safe.