Security at BlueTally

We protect your IT asset data with enterprise-grade security, including encryption, access controls, and secure hosting - built for modern IT teams.

SOC 2 Certified

BlueTally is SOC 2 Type II certified, and we can address any of your security concerns.

Fully encrypted

Your data is protected with 256-bit SSL encryption over the wire and with AES-256 encryption at rest.

Built for Compliance

BlueTally helps you meet IT compliance requirements with SOC 2 certification, data encryption, access controls, and comprehensive security documentation.

Custom permission levels

Create customizable permission levels with extensive filters to regulate actions like field access, checkin/out, and report viewing.

Single sign-on

Seamlessly access BlueTally with a single sign-on, leveraging your existing identity provider for simplified and secure authentication.

SCIM

Automatically and easily provision employees in BlueTally from your existing identity provider.
Security | BlueTally™
Security
Multi-Factor Authentication
Check Icon | BlueTally™
Ability to force Multi-Factor Authentication for all users
Check Icon | BlueTally™
User Role-Based Access
Check Icon | BlueTally™
Cross-Site Request Forgery (CSRF) Protection
Check Icon | BlueTally™
Database Encryption at Rest (AES-256, block-level storage encryption)
Check Icon | BlueTally™
256-bit SSL Encryption
Check Icon | BlueTally™
Security Routines | BlueTally™
Security Routines
Code Reviews
Check Icon | BlueTally™
Static Code Analysis
Check Icon | BlueTally™
Security Awareness Training
Check Icon | BlueTally™
Regular Risk Assessments
Check Icon | BlueTally™
Penetration Testing
Check Icon | BlueTally™
Disaster Recovery Testing & Routines
Check Icon | BlueTally™