Secure Text Messaging
Secure text messaging services for businesses around the world. All your text messages and data are safely stored and managed by professionals.
Secure Data Transfer
All our sites and web services are secured with SSL / HTTPS.
We Value Your Privacy
We will NEVER share or sell your data, texts or numbers.
Delete Your Data
If you wish you can delete all your data in a few clicks.
Use a Secure Service for Your SMS Communications
You don’t have to worry about your data safety anymore once you’ve signed up to TextMagic.
Your Data is Backed Up 24 / 7 / 365
In the unlikely event of a problem with one of our secure servers none of your data will be lost and your business will not be affected.
Daily Server & Website Scans
The McAfee Secure service scans our website every day and looks for any exploitable weaknesses, allowing us to keep our security as tight as possible.
Secure Physical Location of Servers
Our servers are located in a secure data centre in Europe, in restricted areas with absolutely no physical access available to third parties.
Secure Billing & Payments
TextMagic does not store credit or debit card details on this website. All payment data is securely stored by a third-party PCI-compliant payment gateway.
How TextMagic Safeguards Your Online Security
Security is a top priority for TextMagic. We have taken steps to safeguard the security of text messages sent through our SMS gateway, as well as online payments and actions that you conduct through our web platform.
Third-Party Penetration Testing
We perform regular external security penetration tests at least annually using certified vendors. The tests involve high-level server penetration tests and in-depth testing for vulnerabilities inside the application. All identified vulnerabilities are analyzed and remediated appropriately.
Our organization undergoes independent third-party assessments to test our security and compliance controls.
All team members are required to sign and adhere to an industry-standard confidentiality agreement prior to their first day of work.
We perform background checks on all new team members in accordance with local laws.
Information Security Program
We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.
Roles and Responsibilities
Roles and responsibilities related to our Information Security Program and the protection of our customer’s data is well defined and documented. Our team members are required to review and accept all of the security policies.
Security Awareness Training
Our team members are required to go through employee security awareness training covering industry-standard practices and information security topics such as social engineering, phishing scams, and hackers.
Data Hosting Security
All our production data is hosted on OVHCloud bare metal servers. All these databases are located in France. Online database backup is hosted on Google Cloud Platform, located in the United States. Offline database backups are hosted on Amazon Web Services, located in the United States, and are subject to our data retention policy.
Encryption at Rest
All databases are encrypted at rest to protect the data of our customers from unauthorized access.
Encryption in Transit
Our application uses industry-standard Transport Layer Security (TLS) to create a secure connection. This includes all data sent between the web, desktop, iOS, and Android apps and the TextMagic servers. There is no possibility to connect to TextMagic without TLS. The minimum supported version of TLS is 1.2. All connections are made securely over HTTPS.
All requests to our infrastructure are routed through Cloudflare’s CDN network, which is built to withstand complex and large DDoS attacks.
Application Infrastructure Security
All of our services are hosted with OVHCloud, the largest hosting provider in Europe. They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit OVHCloud Security.
We perform vulnerability scanning monthly and actively monitor for threats to ensure secure usage of our services.
Logging and Monitoring
We actively monitor and log various cloud services.
Business Continuity and Disaster Recovery
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
We have a process for handling information security events which includes escalation procedures, rapid mitigation, and communication.
Permissions and Authentication
Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their role.
Where available we have Single Sign-on (SSO), 2-factor authentication (2FA).
Least Privilege Access Control
We follow the principle of least privilege with respect to identity and access management. This means that employees are only granted access to production infrastructure or tooling if their job role requires it. The whole access to production infrastructure or customer data is monitored.
Quarterly Access Reviews
We perform quarterly access reviews of all team members with access to sensitive systems.
All team members are required to adhere to a minimum set of password requirements and complexity for access.
All company-issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.
Vendor and Risk Management
Annual Risk Assessments
We undergo at least annual risk assessments to identify, analyze and mitigate any potential threats, including considerations for fraud. Once a risk is identified, TextMagic makes all possible steps to remediate any threats to protect our application system and customer data.
Vendor and Risk Management
Our service providers undergo a thorough security assessment as a part of the evaluation process and then go through regular SOC1, SOC2, and/or ISO/IEC 27001 audits thereafter. In the event, these audits have material findings, which present risks to TextMagic or our customers, we work closely with the vendor to track their remediation efforts until the issue has been resolved.