Secure Text Messaging

Secure text messaging services for businesses around the world. All your text
messages and data are safely stored and managed by professionals.

Secure data transfer

All our sites and web services are secured with SSL / HTTPS.

We value your privacy

We will NEVER share or sell your data, texts or numbers.

Delete your data

If you wish you can delete all your data in a few clicks.

Use a Secure Service for Your SMS Communications

You don’t have to worry about your data safety anymore once you’ve signed up to TextMagic.

Your data is backed up 24 / 7 / 365

In the unlikely event of a problem with one of our secure servers none of your data will be lost and your business will not be affected.

Secure physical location of servers

Our servers are located in a secure data center in Europe, in restricted areas with absolutely no physical access available to third parties.

Daily server & website scans

The participate Secure service scans our website every day and looks for any exploitable weaknesses, allowing us to keep our security as tight as possible.

Secure billing & payments

TextMagic does not store credit or debit card details on this website. All payment data is securely stored by a third-party PCI-compliant payment gateway.

100,000+ Happy Users Since 2001

Here is how our customers have improved their businesses with our text messaging service.

SEAN Whelan

Managing Director

“I would recommend TextMagic solution to businesses who supply services like plumbers, electrician, pest control, couriers parts delivery. Anyone who supplies a service needs this solution to improve productivity.”

Read case study
Peter Harris

Managing Director

“QiQ has used TextMagic for over a year now and we love this service. It is flexible in how we send and receive messages and it is cost-effective."

Read case study
Robert Ritchie

VP of Ops & Technology

“TextMagic provided a reliable, professional and powerful way to send SMS for our urgent medical services organization."

Read case study
James Raby

Director

“After looking into a variety of texting services we chose TextMagic because of the variety of features it offers along with the price.”

Read case study
Matthias Tomczak

Convener

“We found that TextMagic´s text messaging service is a valuable tool to increase our donation income.”

Read case study
Simon Dalrymple

Office Controller

“TextMagic allowed us to send and receive information to drivers and engineers all from one set point. It's much easier than different members of the office staff sending instructions on their mobiles and then when they leave the office we do not have a data trail.”

Read case study

How TextMagic Safeguards Your Online Security

Security is a top priority for TextMagic. We have taken steps to safeguard the security of text messages sent through our SMS gateway, as well as online payments and actions that you conduct through our web platform.

Soc 2 Type II Certification
TextMagic is SOC 2 Type II certified. This confirms that our information security practices, policies, procedures, and operations meet the highest security standard. Our Information Security Program is also communicated throughout the organization with the help of Secureframe.
Learn more
GDPR
We value our customers and their privacy rights. Since 2017, TextMagic has dedicated considerable resources to fully comply with the EU data protection requirements set forth by the General Data Protection Regulation ("GDPR"). Please read our dedicated GDPR page for more info about our security and compliance roadmap.
Learn more

Organizational Security

Third-Party Penetration Testing

We perform regular external security penetration tests at least annually using certified vendors. The tests involve high-level server penetration tests and in-depth testing for vulnerabilities inside the application. All identified vulnerabilities are analyzed and remediated appropriately.

Third-Party Audits

Our organization undergoes independent third-party assessments to test our security and compliance controls.

Confidentiality

All team members are required to sign and adhere to an industry-standard confidentiality agreement prior to their first day of work.

Background Checks

We perform background checks on all new team members in accordance with local laws.

Soc 2 Type II Certification

TextMagic is SOC 2 Type II certified. This confirms that our information security practices, policies, procedures, and operations meet the highest security standard. Our Information Security Program is also communicated throughout the organization with the help of Secureframe.

Roles and Responsibilities

Roles and responsibilities related to our Information Security Program and the protection of our customer’s data is well defined and documented. Our team members are required to review and accept all of the security policies.

Security Awareness Training

Our team members are required to go through employee security awareness training covering industry-standard practices and information security topics such as social engineering, phishing scams, and hackers.

Infrastructure Security

Data Hosting Security

All our production data is hosted on OVHCloud bare metal servers. All these databases are located in France. Online database backup is hosted on Google Cloud Platform, located in the United States. Offline database backups are hosted on Amazon Web Services, located in the United States, and are subject to our data retention policy.

Encryption at Rest

All databases are encrypted at rest to protect the data of our customers from unauthorized access.

Encryption in Transit

Our application uses industry-standard Transport Layer Security (TLS) to create a secure connection. This includes all data sent between the web, desktop, iOS, and Android apps and the TextMagic servers. There is no possibility to connect to TextMagic without TLS. The minimum supported version of TLS is 1.2. All connections are made securely over HTTPS.

DDoS Prevention

All requests to our infrastructure are routed through Cloudflare’s CDN network, which is built to withstand complex and large DDoS attacks.

Application Infrastructure Security

All of our services are hosted with OVHCloud, the largest hosting provider in Europe. They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit OVHCloud Security.

Vulnerability Scanning

We perform vulnerability scanning monthly and actively monitor for threats to ensure secure usage of our services.

Logging and Monitoring

We actively monitor and log various cloud services.

Business Continuity and Disaster Recovery

We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.

Incident Response

We have a process for handling information security events which includes escalation procedures, rapid mitigation, and communication.

Access Security

Permissions and Authentication

Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their role. Where available we have Single Sign-on (SSO), 2-factor authentication (2FA).

Least Privilege Access Control

We follow the principle of least privilege with respect to identity and access management. This means that employees are only granted access to production infrastructure or tooling if their job role requires it. The whole access to production infrastructure or customer data is monitored.

Quarterly Access Reviews

We perform quarterly access reviews of all team members with access to sensitive systems.

Password Requirements

All team members are required to adhere to a minimum set of password requirements and complexity for access.

Password Managers

All company-issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.

Vendor and Risk Management

Annual Risk Assessments

We undergo at least annual risk assessments to identify, analyze and mitigate any potential threats, including considerations for fraud. Once a risk is identified, TextMagic makes all possible steps to remediate any threats to protect our application system and customer data.

Vendor and Risk Management

Our service providers undergo a thorough security assessment as a part of the evaluation process and then go through regular SOC1, SOC2, and/or ISO/IEC 27001 audits thereafter. In the event, these audits have material findings, which present risks to TextMagic or our customers, we work closely with the vendor to track their remediation efforts until the issue has been resolved.

If you have any questions or wish to report a potential security issue, please contact .

Thousands of Businesses are Already Using TextMagic

See what our customers are saying about TextMagic's business text messaging services.

View all case studies

Try our fully featured business texting platform today