Currently the documentation is only available in English. We are working hard to get into the other languages. Thank you for your patience.
The security of the information you put into Twoodo is very important to us.
Twoodo uses physical, procedural, and technical safeguards to preserve the integrity and security of your information. Some examples of what we do:
Twoodo continuously replicates your data between physical locations to prevent data loss..
Twoodo uses continued log tracking stores it in different locations in case of issue. We keep records since the site has started.
All data access in Twoodo is subject to numerous checks to ensure no users from outside your company ever see or modify your data without you explicitly granting them access within Twoodo.
Twoodo follows best practices in all areas of application security and prevents common web attack vectors.
When you enter information into Twoodo, we use secure socket layer (SSL) technology to a 128-bit encrypted (same security as found in GMAIL) transmission, which helps protect your data.
In addition, we use a cloud based CDN that tracks all illegal web traffic and blocks them even before they reach our servers.
For more information on the services please visit Cloud Fare: https://www.cloudflare.com/features-security.
All of Twoodo’s servers are hosted in secure, SAS 70 audited data centers.
All servers are firewalled to permit the minimum traffic necessary to run the service, and access to those servers is limited to Twoodo employees with a legitimate business need.
Email us at hello@twoodo.com.