Secure Text Messaging

Secure text messaging services for businesses around the world. All your text messages and data are safely stored and managed by professionals.

Secure Data Transfer

All our sites and web services are secured with SSL / HTTPS.

We Value Your Privacy

We will NEVER share or sell your data, texts or numbers.

Delete Your Data

If you wish you can delete all your data in a few clicks.

Security settings overview page showing how to use secure text messaging service.

Use a Secure Service for Your SMS Communications

You don’t have to worry about your data safety anymore once you’ve signed up to TextMagic.

  • Your Data is Backed Up 24 / 7 / 365
    In the unlikely event of a problem with one of our secure servers none of your data will be lost and your business will not be affected.

  • Daily Server & Website Scans
    The McAfee Secure service scans our website every day and looks for any exploitable weaknesses, allowing us to keep our security as tight as possible.

  • Secure Physical Location of Servers
    Our servers are located in a secure data centre in Europe, in restricted areas with absolutely no physical access available to third parties.

  • Secure Billing & Payments
    TextMagic does not store credit or debit card details on this website. All payment data is securely stored by a third-party PCI-compliant payment gateway.


How TextMagic Safeguards Your Online Security

Security is a top priority for TextMagic. We have taken steps to safeguard the security of text messages sent through our SMS gateway, as well as online payments and actions that you conduct through our web platform.


Organizational Security

  • Third-Party Penetration Testing
    We perform regular external security penetration tests at least annually using certified vendors. The tests involve high-level server penetration tests and in-depth testing for vulnerabilities inside the application. All identified vulnerabilities are analyzed and remediated appropriately.

  • Third-Party Audits
    Our organization undergoes independent third-party assessments to test our security and compliance controls.

  • Confidentiality
    All team members are required to sign and adhere to an industry-standard confidentiality agreement prior to their first day of work.

  • Background Checks
    We perform background checks on all new team members in accordance with local laws.

  • Information Security Program
    We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.

  • Roles and Responsibilities
    Roles and responsibilities related to our Information Security Program and the protection of our customer’s data is well defined and documented. Our team members are required to review and accept all of the security policies.

  • Security Awareness Training
    Our team members are required to go through employee security awareness training covering industry-standard practices and information security topics such as social engineering, phishing scams, and hackers.


Infrastructure Security

  • Data Hosting Security
    All our production data is hosted on OVHCloud bare metal servers. All these databases are located in France. Online database backup is hosted on Google Cloud Platform, located in the United States. Offline database backups are hosted on Amazon Web Services, located in the United States, and are subject to our data retention policy.

  • Encryption at Rest
    All databases are encrypted at rest to protect the data of our customers from unauthorized access.

  • Encryption in Transit
    Our application uses industry-standard Transport Layer Security (TLS) to create a secure connection. This includes all data sent between the web, desktop, iOS, and Android apps and the TextMagic servers. There is no possibility to connect to TextMagic without TLS. The minimum supported version of TLS is 1.2. All connections are made securely over HTTPS.

  • DDoS Prevention
    All requests to our infrastructure are routed through Cloudflare’s CDN network, which is built to withstand complex and large DDoS attacks.

  • Application Infrastructure Security
    All of our services are hosted with OVHCloud, the largest hosting provider in Europe. They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit OVHCloud Security.

  • Vulnerability Scanning
    We perform vulnerability scanning monthly and actively monitor for threats to ensure secure usage of our services.

  • Logging and Monitoring
    We actively monitor and log various cloud services.

  • Business Continuity and Disaster Recovery
    We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.

  • Incident Response
    We have a process for handling information security events which includes escalation procedures, rapid mitigation, and communication.

Access Security

  • Permissions and Authentication
    Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their role.
    Where available we have Single Sign-on (SSO), 2-factor authentication (2FA).

  • Least Privilege Access Control
    We follow the principle of least privilege with respect to identity and access management. This means that employees are only granted access to production infrastructure or tooling if their job role requires it. The whole access to production infrastructure or customer data is monitored.

  • Quarterly Access Reviews
    We perform quarterly access reviews of all team members with access to sensitive systems.

  • Password Requirements
    All team members are required to adhere to a minimum set of password requirements and complexity for access.

  • Password Managers
    All company-issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.


Vendor and Risk Management

  • Annual Risk Assessments
    We undergo at least annual risk assessments to identify, analyze and mitigate any potential threats, including considerations for fraud. Once a risk is identified, TextMagic makes all possible steps to remediate any threats to protect our application system and customer data.

  • Vendor and Risk Management
    Our service providers undergo a thorough security assessment as a part of the evaluation process and then go through regular SOC1, SOC2, and/or ISO/IEC 27001 audits thereafter. In the event, these audits have material findings, which present risks to TextMagic or our customers, we work closely with the vendor to track their remediation efforts until the issue has been resolved.

If you have any questions or wish to report a potential security issue, please contact .
Thousands of Small Businesses Are Already Using TextMagic