Robust security

Tally is designed with robust, industry-standard security measures to protect client data, including data used for model training.

Robust security

Tally is designed with robust, industry-standard security measures to protect client data, including data used for model training.

Fully secured and encrypted data

We prioritize the privacy and protection of your information with robust security measures, transparent practices, and full control over your data.

Fully secured and encrypted data

We prioritize the privacy and protection of your information with robust security measures, transparent practices, and full control over your data.

Fully secured and encrypted data

We prioritize the privacy and protection of your information with robust security measures, transparent practices, and full control over your data.

Data storage

All data is stored in the United States using secure AWS and Azure servers.

Data storage

All data is stored in the United States using secure AWS and Azure servers.

Data storage

All data is stored in the United States using secure AWS and Azure servers.

No data sharing

We never share or sell your firm’s or clients’ information with third parties.

No data sharing

We never share or sell your firm’s or clients’ information with third parties.

No data sharing

We never share or sell your firm’s or clients’ information with third parties.

Encryption

All data is encrypted both in transit and at rest using industry-leading encryption protocols.

Encryption

All data is encrypted both in transit and at rest using industry-leading encryption protocols.

Encryption

All data is encrypted both in transit and at rest using industry-leading encryption protocols.

Audit logs

Complete logging and monitoring of all activities for traceability.

Audit logs

Complete logging and monitoring of all activities for traceability.

Audit logs

Complete logging and monitoring of all activities for traceability.

Data retention

Clear policies for how long data is stored and when it is deleted.

Data retention

Clear policies for how long data is stored and when it is deleted.

Data retention

Clear policies for how long data is stored and when it is deleted.

Industry-standard protection

Tally is protected with AES-256 and other industry standards.

Industry-standard protection

Tally is protected with AES-256 and other industry standards.

Industry-standard protection

Tally is protected with AES-256 and other industry standards.

No AI training

Client financial data, PII, and documents are never used to train AI models.

No AI training

Client financial data, PII, and documents are never used to train AI models.

No AI training

Client financial data, PII, and documents are never used to train AI models.

No operating system access

Tally operates on browsers in VMs once granted individual account access with your tools.

No operating system access

Tally operates on browsers in VMs once granted individual account access with your tools.

No operating system access

Tally operates on browsers in VMs once granted individual account access with your tools.

Security operations and compliance

We uphold the highest standards of trust by undergoing continuous evaluations and audits to ensure your data remains secure and compliant.

Security operations and compliance

We uphold the highest standards of trust by undergoing continuous evaluations and audits to ensure your data remains secure and compliant.

Security operations and compliance

We uphold the highest standards of trust by undergoing continuous evaluations and audits to ensure your data remains secure and compliant.

Regular assessments

Tally undergoes regular pentests, social enginering, and financial and IT compliance reviews with third party audit firms.

Regular assessments

Tally undergoes regular pentests, social enginering, and financial and IT compliance reviews with third party audit firms.

Regular assessments

Tally undergoes regular pentests, social enginering, and financial and IT compliance reviews with third party audit firms.

Compliance assessments

SOC 2 Type II report on request, and other security assessments.

Compliance assessments

SOC 2 Type II report on request, and other security assessments.

Compliance assessments

SOC 2 Type II report on request, and other security assessments.

Accelerate your firm

Tally helps teams be more efficient, scale faster, and deliver greater accuracy, without compromising on quality.

We're onboarding firms on a case-by-case basis. Reach out to chat about your use cases.

Accelerate your firm

Tally helps teams be more efficient, scale faster, and deliver greater accuracy, without compromising on quality.

We're onboarding firms on a case-by-case basis. Reach out to chat about your use cases.

Accelerate your firm

Tally helps teams be more efficient, scale faster, and deliver greater accuracy, without compromising on quality.

We're onboarding firms on a case-by-case basis. Reach out to chat about your use cases.