Skip to main content

Overview

Tabbly implements enterprise-grade security to protect your data, calls, and customer information.

End-to-End Encryption

Encryption Standards

Call Encryption
  • All calls encrypted in transit
  • TLS 1.3 encryption
  • Secure protocols
  • No unencrypted data
Data Encryption
  • Data encrypted at rest
  • AES-256 encryption
  • Secure key management
  • Regular key rotation

Data Encryption at Rest

Storage Security

Encrypted Storage
  • All data encrypted
  • Database encryption
  • File encryption
  • Backup encryption
Key Management
  • Secure key storage
  • Key rotation policies
  • Access controls
  • Audit logging

Access Control and Permissions

Role-Based Access Control (RBAC)

User Roles
  • Admin: Full access
  • Manager: Team management
  • Agent: Limited access
  • Viewer: Read-only access
Permission Management
  • Granular permissions
  • Custom roles
  • Team-based access
  • Resource-level controls

Access Features

  • Multi-factor authentication
  • Single sign-on (SSO)
  • Session management
  • Activity logging

API Key Management

API Security

Key Generation
  • Secure key generation
  • Unique keys per application
  • Key rotation support
  • Expiration dates
Key Management
  • Create and revoke keys
  • Monitor key usage
  • Set permissions
  • Track activity

Best Practices

  • Rotate keys regularly
  • Use different keys for different apps
  • Never share keys
  • Monitor key usage

Two-Factor Authentication (2FA)

2FA Setup

Enabling 2FA
  • Navigate to security settings
  • Enable 2FA
  • Choose method (SMS, app, email)
  • Complete setup
2FA Methods
  • SMS codes
  • Authenticator apps
  • Email codes
  • Backup codes

Security Benefits

  • Additional security layer
  • Protection against breaches
  • Compliance requirement
  • Peace of mind

IP Whitelisting

Whitelist Configuration

Setting Up Whitelisting
  • Add IP addresses
  • Configure rules
  • Set exceptions
  • Test access
Use Cases
  • Office networks
  • VPN access
  • API access
  • Enhanced security

Audit Logs and Activity Tracking

Audit Features

Logged Activities
  • User logins
  • Configuration changes
  • Data access
  • API calls
  • Security events
Log Access
  • View audit logs
  • Search and filter
  • Export logs
  • Compliance reporting

Compliance

  • SOC 2 compliance
  • GDPR compliance
  • HIPAA compliance
  • Industry standards

Best Practices

Always enable two-factor authentication for additional security.
Regularly review access permissions and audit logs. Remove unnecessary access.
Keep API keys secure. Never commit keys to code repositories.
Keep security settings updated. Enable new security features as available.