Encryption in transit
TLS 1.2+ on every endpoint. WSS for WebSocket. Token-based auth on every connection. No clear-text inside data centres.
Tody is built with realistic enterprise expectations in mind: encryption in transit, hashed credentials, India data residency, signed webhooks, audit logging, and policies for abuse, suspension, and recovery.
We focus on what production buyers care about: where data lives, how it’s protected, who can do what, and how you prove it later. No marketing fog — just the operational realities.
TLS 1.2+ on every endpoint. WSS for WebSocket. Token-based auth on every connection. No clear-text inside data centres.
Bcrypt password hashing. API keys stored hashed, shown once. No customer secrets in logs. Key rotation supported.
Data hosted in Indian data centres. Backups stay in India. Cross-border movement is opt-in per integration.
Template changes, campaigns, wallet ledger, API key issuance, and admin actions are all logged with exportable trails.
Each control below is built into the platform — not a roadmap promise. We list real limits and real behaviour so your security team can validate quickly.
Default 60 req/min on sandbox keys. Production keys are sized per customer. Burst limits configurable.
Programmatic suspension blocks all sending. Business status is checked before every API call.
All templates pass through review. Variables are typed. Rejected templates cannot be used in production.
Idempotency keys eliminate duplicate sends. Replay-safe within 24 hours.
HMAC-SHA256 signatures on every webhook payload. Verify with your shared secret to prevent spoofing.
Double-entry accounting on every debit and credit. Export CSV for finance reconciliation.
We’ve documented the response process for security events, abuse reports, suspected key compromise, and account takeover. Customers on enterprise plans get a named incident point of contact and a 1-hour acknowledgement window.
If your team needs additional detail for a formal review, email security@tody.in — we share what we can after a brief verification.
We’ll respond to your questionnaire, schedule a technical walk-through, and share architecture diagrams under NDA.