FAQ

Empty

.
.

Security

Last updated on
January 31, 2024

What type of encryption method is used?

Toric employs Google SSO Microsoft SSO Okta SSO.

How is the securing handled within Toric? Will it be doing all the transformation on your servers or can we implement it completely on our server/cloud?

The data comes to Toric and lands in a data lake. Once it’s processed the user must setup a destination — to land the processed data. This can be in a Toric managed Warehouse or any other warehouse outside of Toric (under customer management). The lake data is expired within a time period chosen for the account. Additionally, Toric is SOC2 compliant.

Table of Contents