Security at BlueTally

We protect your IT asset data with enterprise-grade security, including encryption, access controls, and secure hosting - built for modern IT teams.

SOC 2 Certified

BlueTally is SOC 2 Type II certified, and we can address any of your security concerns.

Fully encrypted

Your data is protected with 256-bit SSL encryption over the wire and with AES-256 encryption at rest.

Custom permission levels

Create customizable permission levels with extensive filters to regulate actions like field access, checkin/out, and report viewing.

Single sign-on

Seamlessly access BlueTally with a single sign-on, leveraging your existing identity provider for simplified and secure authentication.

SCIM

Automatically and easily provision employees in BlueTally from your existing identity provider.

Enterprise ready

Our Enterprise tier offers dedicated hosting, empowering you to choose your regional infrastructure for enhanced performance and compliance in BlueTally.
Security | BlueTally™
Security
Multi-Factor Authentication
Check Icon | BlueTally™
Ability to force Multi-Factor Authentication for all users
Check Icon | BlueTally™
User Role-Based Access
Check Icon | BlueTally™
Cross-Site Request Forgery (CSRF) Protection
Check Icon | BlueTally™
Database Encryption at Rest (AES-256, block-level storage encryption)
Check Icon | BlueTally™
256-bit SSL Encryption
Check Icon | BlueTally™
Security Routines | BlueTally™
Security Routines
Code Reviews
Check Icon | BlueTally™
Static Code Analysis
Check Icon | BlueTally™
Security Awareness Training
Check Icon | BlueTally™
Regular Risk Assessments
Check Icon | BlueTally™
Penetration Testing
Check Icon | BlueTally™
Disaster Recovery Testing & Routines
Check Icon | BlueTally™