Here is how the Textmagic business texting platform is helping businesses daily to grow their revenue and improve their productivity.
“Textmagic is now an integral part of our business. Within the first text back in 2020, we knew this was the right solution.”
Discover how the biggest food company in the world improved employee communication with SMS.
“Not only did Textmagic increase our sales conversion ratio, but it has also helped us connect with our customers more personally.“
Find out how the US-based children's clothing company improved its communications and conversion rates with Textmagic.
“With the implementation of Textmagic, we experienced a zero effort, highly reliable and stable service that helped us to bring our product to the next level.“
Discover how Loomion uses text messaging to effectively keep board members up to date.
“Glad we found Textmagic. The interface and ease of use makes our work so much easier, whilst giving us the professional image we strive to maintain.”
See how the family-based security company automates installation date reminders and schedules bookings via text.
How Textmagic safeguards your online security
Security is a top priority for Textmagic. We have taken steps to safeguard the security of text messages sent through our SMS gateway, as well as online payments and actions that you conduct through our web platform.
Soc 2 Type II Certification
Textmagic is SOC 2 Type II certified. This confirms that our information security practices, policies, procedures, and operations meet
the highest security standard.
Our Information Security Program is also communicated throughout the organization with the help of Secureframe.
We value our customers and their privacy rights. Since 2017, Textmagic has dedicated considerable resources to fully comply with the EU data protection requirements set forth by the General Data Protection Regulation ("GDPR"). Please read our dedicated GDPR page for more info about our security and compliance roadmap.
We perform regular external security penetration tests at least annually using certified vendors. The tests involve high-level server penetration tests and in-depth testing for vulnerabilities inside the application. All identified vulnerabilities are analyzed and remediated appropriately.
Soc 2 Type II certification
Textmagic is SOC 2 Type II certified. This confirms that our information security practices, policies, procedures, and operations meet the highest security standard. Our Information Security Program is also communicated throughout the organization with the help of Secureframe.
Security awareness training
Our team members are required to go through employee security awareness training covering industry-standard practices and information security topics such as social engineering, phishing scams, and hackers.
Roles and responsibilities
Roles and responsibilities related to our Information Security Program and the protection of our customer’s data is well defined and documented. Our team members are required to review and accept all of the security policies.
All team members are required to sign and adhere to an industry-standard confidentiality agreement prior to their first day of work.
Our organization undergoes independent third-party assessments to test our security and compliance controls.
We perform background checks on all new team members in accordance with local laws.
Data hosting security
All our production data is hosted on OVHCloud bare metal servers. All these databases are located in France. Online database backup is hosted on Google Cloud Platform, located in the United States. Offline database backups are hosted on Amazon Web Services, located in the United States, and are subject to our data retention policy.
Encryption in transit
Our application uses industry-standard Transport Layer Security (TLS) to create a secure connection. This includes all data sent between the web, desktop, iOS, and Android apps and the Textmagic servers. There is no possibility to connect to Textmagic without TLS. The minimum supported version of TLS is 1.2. All connections are made securely over HTTPS.
Business continuity and disaster recovery
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
Application infrastructure security
All of our services are hosted with OVHCloud, the largest hosting provider in Europe. They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit OVHCloud Security.
We perform vulnerability scanning monthly and actively monitor for threats to ensure secure usage of our services.
Encryption at rest
All databases are encrypted at rest to protect the data of our customers from unauthorized access.
All requests to our infrastructure are routed through Cloudflare’s CDN network, which is built to withstand complex and large DDoS attacks.
We have a process for handling information security events which includes escalation procedures, rapid mitigation, and communication.
Logging and monitoring
We actively monitor and log various cloud services.
Permissions and authentication
Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their role. Where available we have Single Sign-on (SSO), 2-factor authentication (2FA).
Least privilege access control
We follow the principle of least privilege with respect to identity and access management. This means that employees are only granted access to production infrastructure or tooling if their job role requires it. The whole access to production infrastructure or customer data is monitored.
All team members are required to adhere to a minimum set of password requirements and complexity for access.
All company-issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.
Quarterly access reviews
We perform quarterly access reviews of all team members with access to sensitive systems.
Vendor and risk management
Annual risk assessments
We undergo at least annual risk assessments to identify, analyze and mitigate any potential threats, including considerations for fraud. Once a risk is identified, Textmagic makes all possible steps to remediate any threats to protect our application system and customer data.
Vendor and risk management
Our service providers undergo a thorough security assessment as a part of the evaluation process and then go through regular SOC1, SOC2, and/or ISO/IEC 27001 audits thereafter. In the event, these audits have material findings, which present risks to Textmagic or our customers, we work closely with the vendor to track their remediation efforts until the issue has been resolved.
If you have any questions or wish to report a potential security issue, please contact.
Try our fully featured business texting platform today
Grow revenue and improve engagement rates by sending personalized, action-driven texts to your customers, staff, and suppliers.