Robust security
Tally is designed with robust, industry-standard security measures to protect client data, including data used for model training.
Robust security
Tally is designed with robust, industry-standard security measures to protect client data, including data used for model training.
Fully secured and encrypted data
We prioritize the privacy and protection of your information with robust security measures, transparent practices, and full control over your data.
Fully secured and encrypted data
We prioritize the privacy and protection of your information with robust security measures, transparent practices, and full control over your data.
Fully secured and encrypted data
We prioritize the privacy and protection of your information with robust security measures, transparent practices, and full control over your data.
Data storage
All data is stored in the United States using secure AWS and Azure servers.
Data storage
All data is stored in the United States using secure AWS and Azure servers.
Data storage
All data is stored in the United States using secure AWS and Azure servers.
No data sharing
We never share or sell your firm’s or clients’ information with third parties.
No data sharing
We never share or sell your firm’s or clients’ information with third parties.
No data sharing
We never share or sell your firm’s or clients’ information with third parties.
Encryption
All data is encrypted both in transit and at rest using industry-leading encryption protocols.
Encryption
All data is encrypted both in transit and at rest using industry-leading encryption protocols.
Encryption
All data is encrypted both in transit and at rest using industry-leading encryption protocols.
Audit logs
Complete logging and monitoring of all activities for traceability.
Audit logs
Complete logging and monitoring of all activities for traceability.
Audit logs
Complete logging and monitoring of all activities for traceability.
Data retention
Clear policies for how long data is stored and when it is deleted.
Data retention
Clear policies for how long data is stored and when it is deleted.
Data retention
Clear policies for how long data is stored and when it is deleted.
Industry-standard protection
Tally is protected with AES-256 and other industry standards.
Industry-standard protection
Tally is protected with AES-256 and other industry standards.
Industry-standard protection
Tally is protected with AES-256 and other industry standards.
No AI training
Client financial data, PII, and documents are never used to train AI models.
No AI training
Client financial data, PII, and documents are never used to train AI models.
No AI training
Client financial data, PII, and documents are never used to train AI models.
No operating system access
Tally operates on browsers in VMs once granted individual account access with your tools.
No operating system access
Tally operates on browsers in VMs once granted individual account access with your tools.
No operating system access
Tally operates on browsers in VMs once granted individual account access with your tools.
Security operations and compliance
We uphold the highest standards of trust by undergoing continuous evaluations and audits to ensure your data remains secure and compliant.
Security operations and compliance
We uphold the highest standards of trust by undergoing continuous evaluations and audits to ensure your data remains secure and compliant.
Security operations and compliance
We uphold the highest standards of trust by undergoing continuous evaluations and audits to ensure your data remains secure and compliant.
Regular assessments
Tally undergoes regular pentests, social enginering, and financial and IT compliance reviews with third party audit firms.
Regular assessments
Tally undergoes regular pentests, social enginering, and financial and IT compliance reviews with third party audit firms.
Regular assessments
Tally undergoes regular pentests, social enginering, and financial and IT compliance reviews with third party audit firms.
Compliance assessments
SOC 2 Type II report on request, and other security assessments.
Compliance assessments
SOC 2 Type II report on request, and other security assessments.
Compliance assessments
SOC 2 Type II report on request, and other security assessments.
Accelerate your firm
Tally helps teams be more efficient, scale faster, and deliver greater accuracy, without compromising on quality.
We're onboarding firms on a case-by-case basis. Reach out to chat about your use cases.
Accelerate your firm
Tally helps teams be more efficient, scale faster, and deliver greater accuracy, without compromising on quality.
We're onboarding firms on a case-by-case basis. Reach out to chat about your use cases.
Accelerate your firm
Tally helps teams be more efficient, scale faster, and deliver greater accuracy, without compromising on quality.
We're onboarding firms on a case-by-case basis. Reach out to chat about your use cases.