Access real-time information on system performance and security

We built an entirely new automation platform, starting with trust.

We take data security very seriously. We provide a multi-step, multi-level security system with complete transparency so you not only feel safe, you can see how safe your data is, anytime.

System Status

Get full transparency with a real-time and historical performance view of all technical components of Tray. Even subscribe to updates.

Check system status >

Security

We take maximum precaution, so your data remains safe. Businesses trust Tray.io to safeguard their data and processes.

  • Tray encrypts all sensitive data

    Encryption

    We encrypt all of our sensitive data, authentication and tokens. More details are available in this in-depth article on security at Tray.io.

  • All communications between your browser and Tray are secure

    Network security

    All communications between your browser and Tray.io’s website are encrypted via HTTPS.

  • Tray's log retention is flexible and designed to fit your requirements

    Log data retention

    The Tray Platform offers flexible log data retention policies designed to fit your requirements.

  • The data on Tray servers is private

    Virtual private cloud

    Data held on servers are not open to the public.

  • Tray's platform allows for session management and complete access control

    Session management

    Monitor sessions by IP address, location, time, browser and operating system and revoke access to prevent unauthorized access to your Tray Platform account.

  • The Tray platform hosts two factor authentication

    Two-factor authentication

    Add a second layer of security to protect fraudulent access to your Tray Platform account. Read our blog to learn more about it.

  • Tray's platform offers password prompting

    Password prompting

    Any major account action will prompt a user to re-enter her password.

  • Tray's platform offers behavior modeling

    Behavior modeling

    To detect unusual or suspicious activity on a user's account we use technology to build intelligent models of user behavior. 

Compliance

Tray strives to gain and retain the trust of our customers. Providing a comprehensive compliance program with certifications and attestations is integral to this mission.

  • Tray is SOC 2 compliant

    SOC 2 Type 2

    Tray.io is now SOC 2 Type 2 certified, which means that the design and operating effectiveness of our service organization's system has passed a rigorous 6-month security audit. Tray.io engages in regular SOC 2 audits that are conducted by an independent, third-party auditing firm. Contact us to request the latest copy of our SOC 2 audit.

  • Tray is committed to the General Data Protection Regulations

    General Data Protection Regulation (GDPR)

    Tray.io is committed to compliance with the General Data Protection Regulation (GDPR), which went into effect May 25, 2018, and applies to individuals in the European Union. Please contact us to have an in-depth conversation about Tray.io’s approach to GDPR and Trust. Please also get in touch to receive our Data Processing Agreement (DPA).

  • Blue HIPAA compliant

    HIPAA compliant

    Tray.io is fully compliant with HIPAA regulations in handling ePHI (electronic protected health information). We employ data minimization practices to ensure full data security. We've passed an independent, third-party HIPAA audit and are happy to sign BAAs (business associate agreements) as needed.

  • Tray is committed to privacy and trust

    Privacy

    Click here to read Tray.io’s privacy policy.

  • Tray undergoes regular penetration testing

    Penetration testing

    The Tray Platform undergoes regular penetration testing by independent third parties to ensure that our platform is secure.  

Resilience

Because our customers depend on Tray for mission-critical workflow, we invest in ensuring high availability of our systems.

  • Tray offers around the clock support

    On-call policy

    We have an around-the-clock support network of engineers who work very hard to keep Tray running all of the time.  We have an on-call policy for our engineers to be available just in case. 

  • Tray performs automatic back-ups

    Data backup

    Tray’s platform has built in automatic back-ups.

  • Tray infrastructure to replicated and back-ups regularly

    Infrastructure backup

    All Tray infrastructure is replicated and backed up.

  • Tray stores snapshots of workflow data

    Workflow backup

    Tray stores snapshots of our customers’ business logic so we can revert them if necessary.