Overview
Tabbly implements enterprise-grade security to protect your data, calls, and customer information.End-to-End Encryption
Encryption Standards
Call Encryption- All calls encrypted in transit
- TLS 1.3 encryption
- Secure protocols
- No unencrypted data
- Data encrypted at rest
- AES-256 encryption
- Secure key management
- Regular key rotation
Data Encryption at Rest
Storage Security
Encrypted Storage- All data encrypted
- Database encryption
- File encryption
- Backup encryption
- Secure key storage
- Key rotation policies
- Access controls
- Audit logging
Access Control and Permissions
Role-Based Access Control (RBAC)
User Roles- Admin: Full access
- Manager: Team management
- Agent: Limited access
- Viewer: Read-only access
- Granular permissions
- Custom roles
- Team-based access
- Resource-level controls
Access Features
- Multi-factor authentication
- Single sign-on (SSO)
- Session management
- Activity logging
API Key Management
API Security
Key Generation- Secure key generation
- Unique keys per application
- Key rotation support
- Expiration dates
- Create and revoke keys
- Monitor key usage
- Set permissions
- Track activity
Best Practices
- Rotate keys regularly
- Use different keys for different apps
- Never share keys
- Monitor key usage
Two-Factor Authentication (2FA)
2FA Setup
Enabling 2FA- Navigate to security settings
- Enable 2FA
- Choose method (SMS, app, email)
- Complete setup
- SMS codes
- Authenticator apps
- Email codes
- Backup codes
Security Benefits
- Additional security layer
- Protection against breaches
- Compliance requirement
- Peace of mind
IP Whitelisting
Whitelist Configuration
Setting Up Whitelisting- Add IP addresses
- Configure rules
- Set exceptions
- Test access
- Office networks
- VPN access
- API access
- Enhanced security
Audit Logs and Activity Tracking
Audit Features
Logged Activities- User logins
- Configuration changes
- Data access
- API calls
- Security events
- View audit logs
- Search and filter
- Export logs
- Compliance reporting
Compliance
- SOC 2 compliance
- GDPR compliance
- HIPAA compliance
- Industry standards
Best Practices
Enable 2FA
Enable 2FA
Always enable two-factor authentication for additional security.
Regular Reviews
Regular Reviews
Regularly review access permissions and audit logs. Remove unnecessary access.
Secure Keys
Secure Keys
Keep API keys secure. Never commit keys to code repositories.
Stay Updated
Stay Updated
Keep security settings updated. Enable new security features as available.