Security and Trust | Tango (2024)

Product

Product

Product

Pricing

Customers

Customers

Resources

Resources

About Us

Log inTalk to Sales

Security and Trust

Trust

  • We don’t sell, rent, or provide information to third parties to help them advertise to you.
  • Our financial interests are aligned with yours - we make money when you see value in and purchase one of our paid product offerings, ex. Tango Pro and Tango Enterprise.
  • While personal or sensitive data may from time to time be captured during a workflow, rest assured that we do not want or need such data. It’s our view that using your personal or sensitive data in any manner other than to provide our services would be unethical and inconsistent with Tango’s values.

Compliance

SOC 2

Tango is proud to be SOC 2 Type 2 compliant. Additionally, we use Drata’s automation platform to continuously monitor our SOC 2 controls and maintain real-time visibility into our organization’s security posture. Our SOC 2 audit report is available by online request for qualified enterprise customers via the Tango Trust Center.

Infrastructure

Our services are hosted on Amazon Web Services (AWS), which continuously maintains certification for a variety of global security and compliance frameworks. For more information about their certifications and compliance practices, please visit the AWS Security and AWS Compliance sites.

Application Security

  • We use TLS everywhere in the Tango application.
  • Your data is encrypted at rest and in transit using industry standards.
  • We maintain an A from Qualys/SSL Labs (see here).
  • We regularly scan our applications for vulnerabilities using automated tools and apply security patches to vulnerable components.
  • We undergo annual penetration tests from a third-party security firm.
  • When you purchase a paid Tango subscription, your credit card data is not transmitted through nor stored on our system. We use Stripe, a company dedicated to this task. Stripe is certified to PCI Service Provider Level 1. For more information about Stripe’s security practices, see here.

Data Protection and Disaster Recovery

  • Our systems were designed and built with disaster recovery in mind.
  • All of our infrastructure is hosted in the cloud on AWS. We use an AWS VPC that is not publicly accessible.
  • We leverage multiple AWS Availability Zones to redundantly store customer data.
  • Our data is automatically backed up daily and we regularly test that our backups are working and can be easily restored.

Corporate Security

  • All company laptops are actively managed and can be remotely wiped. We require screensaver locks, full disk encryption, anti-malware protection, password manager use, and automatic updates to be enabled.
  • We implement a human review process augmented by automated checks to ensure consistent quality in our software development practices.
  • Access to services, source code, and third-party tools are secured with two-factor authentication whenever possible.
  • Employees are given the lowest level of access that allows them to get their work done and data access is logged.
  • Our employee contracts include a confidentiality agreement.
  • All personnel undergo background checks and receive regular security awareness training.

Responsible Disclosure

  • If you’ve discovered a vulnerability in the Tango application, please contact us at [emailprotected]. We review all security concerns brought to our attention, and we take a proactive approach to emerging security issues.
  • We prioritize clearly written reports with reproducible examples for app.tango.us. We do not accept reports for blog.tango.us or www.tango.us.

FAQs

If you have additional questions, please see the Security section of our FAQs for more detailed information about our application and practices.

Updated 7/25/2022

At Tango, we take data security and privacy very seriously. This page provides some general information about our practices to give you confidence in how we secure your data.

Interactive walkthroughs, created in seconds

Install free extension

Sign up for free

Security and Trust | Tango (53)Security and Trust | Tango (54)Security and Trust | Tango (55)Security and Trust | Tango (56)Security and Trust | Tango (57)Security and Trust | Tango (58)Security and Trust | Tango (59)

Why Tango?

Case StudiesResourcesWall of LoveGalleryBlogChange Enablers, a community by Tango

Popular Links

The Modern Training and Enablement Tech StackA Buyer’s Guide to Tango Business or EnterpriseHow SEARHC Rolled Out Workday to 1,400 Employees with Tango EnterpriseTango vs. Other DAPsTango vs. Scribe

Our Company

PricingAbout UsOur Team

Careers

Press KitCreator Community

Security and Trust | Tango (61)

Security and Trust | Tango (62)

Security and Trust | Tango (63)

Tango Technology, Inc. ©

Privacy Policy

Security and Trust | Tango (2024)

FAQs

What is the relationship between trust and security? ›

Trust and security are interdependent concepts. Lamsal illustrates this using cryptography as an example: one's secure communication with another requires a key obtained via trusted key distribution, [17] . If the key distribution was not worthy of that trust the communication is not secure. ...

What is a security trust? ›

A trust used as a means of holding security interests granted over assets of a debtor for a number of creditors. A security trustee holds the benefit of that security for the beneficiaries of the security trust.

Is security and trust the same thing? ›

Trust is giving the other person hope they will always do the right thing. Security is knowing that they will. Having trust in a relationship makes the SECURITY of the relationship. The securing of a relationship can be done by having trust.

What is the trust level of security? ›

Definition. Trust Level: An appropriate level of hardware and software protection mechanisms in a computer system based on its intended use, and is established based on a risk analysis that includes a probability and consequence of occurrence of an attack on the system.

Is having trust issues an insecurity? ›

Trust issues are the inability to believe that one can rely on another person (friend, romantic, family, etc). Without trust, no relationship is sustainable.” The underlying issue is often distrust borne from past experiences or past relationships, which may cause negative emotions like doubt and insecurity.

How do you rebuild trust and security in a relationship? ›

How to Rebuild Trust in 8 Steps
  1. Take responsibility for the role you played. ...
  2. Practice forgiveness. ...
  3. Leave the past in the past. ...
  4. Allow time and space for grief. ...
  5. Follow through on the small things. ...
  6. Choose to practice vulnerability. ...
  7. Attend to the deeper issues. ...
  8. Co-create a new future.
May 9, 2024

How does a trust protect you? ›

Other Parties Cannot Gain Access to Your Assets

Since your assets in an irrevocable trust are no longer under your control, it is difficult for creditors or those who file a civil suit against you to gain access.

What is the main purpose of a trust? ›

Some of the ways trusts might benefit you include: Protecting and preserving your assets. Customizing and controlling how your wealth is distributed. Minimizing federal or state taxes.

Who owns or controls a trust? ›

The one establishing a trust is called the trustor or grantor. The one who oversees and manages the trust is called the trustee.

Is money safer in a trust? ›

However, assets held in trust are legally protected. This will be important if, after setting up targeted savings or investment accounts for your children, you are forced to file bankruptcy, or you experience business failure. Still another possibility is facing a lawsuit as a result of civil liability.

Can you have trust without safety? ›

Trust is not the same as psychological safety.

But whilst trust is necessary for psychological safety to exist, it is not sufficient.

What type of security is a trust? ›

A trust is a fiduciary1 relationship in which one party (the Grantor) gives a second party2 (the Trustee) the right to hold title to property or assets for the benefit of a third party (the Beneficiary). The trustee, in turn, explains the terms and conditions of the trust to the beneficiary.

How does a security trust work? ›

A trust used as a means of holding security interests granted over assets of a debtor for a number of creditors. A security trustee holds the benefit of that security for the beneficiaries of the security trust.

What is the meaning of trust security? ›

Trust Security means any one of the Common Securities or the Preferred Securities. " Trust Securities Certificate" means any one of the Common Securities Certificates or the Preferred Securities Certificates. "

What is the role of trust in information security? ›

The Role of Trust Anchors in IT Security

Without trustworthy anchors, organizations risk making decisions based on fraudulent data, leading to significant financial, legal, and reputational damage. One key advantage of using trust anchors in identity verification is fraud reduction.

What is trust and securities? ›

A trust-preferred security is a security possessing characteristics of both equity and debt. A company creates trust-preferred securities by creating a trust, issuing debt to it, and then having it issue preferred stock to investors. Trust-preferred securities are generally issued by bank holding companies.

What is a trust relationship in cyber security? ›

An agreed upon relationship between two or more system elements that is governed by criteria for secure interaction, behavior, and outcomes relative to the protection of assets.

How does trust relate to safety? ›

Trust is important at all levels, from individual interactions to broader connections. It impacts teamwork, coordination, communication, and collaboration. "Psychological safety" refers to how confident we feel to take appropriate risks at work because of our relationships with colleagues and managers.

Top Articles
How to Become a Digital Nomad
A History of Arcade Games - Read on for a deep dive.
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 5863

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.