Toggly Trust

Security at Toggly

We encrypt your data in transit and at rest, and provide administrative controls including single sign-on (SSO) and enforced two-factor authentication (2FA) via SSO to ensure that your data remains secure organization-wide.
Security
Compliance
Legal & Privacy
Reliability

Security-First Culture

Our Approach to Security

Exceed Expectations
****
We believe in going above and beyond minimum technology security standards to keep setting the bar higher.
Internal Culture
****
We believe a culture of security among the people on our team and in our community is of utmost importance.
External Validations
****
We demonstrate our commitment to security through stringent standards and third-party certifications.

Protect & Respond

Operational Security

Toggly ensures data security standards, and protects against & responds to security threats.

Data Storage & Transmission

Toggly utilizes certified Tier 3 data centers managed by Amazon Web Services. Toggly’s system uses secure channels to transmit data - offering a high degree of security, privacy, and availability.
Read More

People Training

An important pillar of Toggly’s security-first culture is security awareness. All employees undergo ongoing security training to stay up-to-date on the latest security threats and security best practices. This includes courses on phishing awareness, data security, and secure software development.

Monitoring and Rapid Response

Toggly logs activity and security events to a centralized logging service which is actively monitored for potential threats by our dedicated security team. We treat potential threats with the utmost priority and investigate them immediately. Any active threat is responded to quickly and with a methodical process that includes reporting to customers, regulators, and government bodies.

Product Security

Steps we take to keep our products secure. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Get Started FREE
Security review by our engineers
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Automated security tests
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
External penetration testing
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Encryption in transit and at rest
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Education is Fundamental to Security

We are dedicated to raising industry awareness

Feature Flags
A Comprehensive Guide to Implementing Feature Flags in Flutter
What are feature flags? Feature flags, also known as feature toggles or feature switches, are a…
Alexandru Puiu
April 14, 2023
3 min read