Say hello!

SECURITY & data privacy

Your data is secure with Tontine


We know that your data is sensitive. Thousands of companies worldwide use Tontine every day to generate hundreds of millions of data insights on their e-commerce stores. That’s why we’ve built Tontine with military-grade security features at the forefront, and supplement that with regular audits to ensure you’re always protected.

Product and infrastructure

Top security, by design

We apply strict access controls to protect user accounts.

Tontine requires authentication for access to all application pages on the platform, except for those explicitly intended to be public. Our data is protected by military-grade encryption (RSA-4096 and AES-256).

Passwords, 2-factor authentication and single sign-on

All passwords stored with Tontine are hashed with a random salt using industry-standard techniques. All data sent to or from Tontine is encrypted using TLS, and all customer data is encrypted with military-grade encryption (RSA-4096 and AES-256) 

  • All users are directed to use 2-factor authentication (2FA) , which increases the security of the Tontine platform by adding a second layer of authentication when signing in. Instead of only relying on a password, 2FA will also require you to enter a temporary code that you can access from your mobile device. 2FA is intended to help you:
  • Protect your website and mobile application when your Tontine password is stolen;
  • Mitigate against phishing attacks by not only relying on your password; 
  • Adhere to the protocols set by your enterprise security policy. 
  • Tontine allows users to implement Single Sign-On (SSO) through SAML 2.0, an open standard data format for exchanging authentication and authorization information. This allows your team to log into Tontine using existing corporate credentials. SSO is an account-level feature that will apply to all projects and experiments. SSO is available as part of the contract you sign with Tontine. 

We have processes designed to enforce minimum password requirements internally throughout the platform, and we currently enforce the following requirements and security standards: 

  • Passwords must be a minimum of 8 characters in length and include a mix of uppercase and lowercase letters as well as numbers and symbols. 
  • Multiple logins with the wrong username or password will result in a locked account, which will be disabled for a period of time to help prevent a brute-force login, but not long enough to prevent legitimate users from being unable to use the application.
  • Email-based password reset links are sent only to a user’s pre-registered email address with a temporary link.
  • Tontine limits multiple login attempts from the same email address.
  • Tontine prevents reuse of recently-used passwords.
Read More
Read Less
Session protection and timeouts

Each time a user logs into Tontine, the system assigns them a new, unique session identifier, currently consisting of 64 bytes of random data designed for protection against brute forcing. All sessions are designed to have a hard timeout (currently set to 7 days).

Single sign-on sessions are configured with an inactivity timeout as well (currently, 12 hours). There is an optional setting to terminate any session after 15 minutes of inactivity — please reach out to us to enable this. When signing out of Tontine, the system is designed to delete the session cookie from the client and to invalidate the session identifier on Tontine’s servers.

Read More
Read Less
Network and transmission controls

Tontine proactively monitors and updates its data transfer technologies periodically to provide maximum network security while still remaining performant. 

By default, all communications on the Tontine platform are protected with military-grade encryption (RSA-4096 and AES-256). This includes using Transport Layer Security (TLS) with regular updates to cipher suites and configurations. 

Network security —
Tontine regularly updates its network architecture schema and records data flows between its systems. Firewall rules and access restrictions are reviewed for appropriateness on a regular basis. 

Activity logs —
Activity logs are kept at all account levels, including but not limited to the following actions undertaken by any user: 

  • Login and logout.
  • Account setup, including linking to an e-commerce store’s platform (Shopify, Magento, WooCommerce, etc.), inventory download, product list download, etc. 
  • Experiments, including creating, deleting, starting, pausing, updating and archiving tests. All test data is recorded and stored with military-grade encryption. 
  • Updating account settings.

These activity logs are kept for your benefit, and you may request part or all of it at any time subject to the contract you signed with Tontine prior to the commencement of the service. 

Read More
Read Less

We host all of our data in physically secure, U.S.-based Amazon Web Services (AWS) facilities that include 24/7 on-site security, camera surveillance and more. Learn more about AWS security protocols.

All data is encrypted in transit (using TLS) and at rest (using AES-256). 

Tontine’s infrastructure is designed to be fault tolerant. All databases operate in a cluster configuration and the application tier scales using load balancing technology that dynamically meets demand to achieve industry-leading data redundancy and resiliency. 

All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to the company’s infrastructure are tracked and documented, and security events are logged appropriately.

Read More
Read Less

People and processes

You can count on us

At Tontine, we know that your data is precious and we’re focused on protecting it.

World-class risk management governance

Tontine’s Security, Privacy and Compliance Team reports directly to the CEO. This cross-functional team focuses on proactively mitigating threats with respect to data breaches, database penetration, and compliance violations in accordance with established global data protection and security frameworks. 

The Security, Privacy and Compliance Team conducts periodic risk assessments for Tontine — top risks are shortlisted, root cause analysis is performed, and treatment plans are prepared and disseminated. The Chief Technology Officer is responsible for monitoring progress on the treatment plans.

Read More
Read Less
Stringent personnel security

Our employees are held to the highest standards of data and privacy protection and we further supplement that with professional development on information security training programs, strict job controls and restricted access to your data. 

  • Internal access to data —
    Access to your account data stored on Tontines platform is restricted within Tontine on a strictly need-to-know basis. Employees require managerial confirmation that access to your account’s data is required to perform their job function. Tontine requires the use of SSO, strong passwords and/or 2-factor authentication for all employees to access production servers managed by Tontine. 
  • Job-specific controls —
    Tontine has implemented extensive employee job controls to help protect the information stored on the platform:
  1. Every new hire must pass through a background check and review a “Legal and Security” training course. Certain positions will require that they attend at least one professional development event per quarter to keep up-to-date with the latest industry trends around informational security. 
  2. All Tontine employees, contractors and personnel are required to sign confidentiality agreements prior to being hired and accessing the company’s production systems. 
  3. Employee access to production systems that contain your data is logged and audited. Adjustments are made as necessary upon further review. 
  4. Tontine employees, contractors and personnel are subject to disciplinary action, including but not limited to termination, if they are found to have abused their access to customer data. In the event that this occurs, all relevant parties (including yourself, if your data was affected) will be notified within 24 hours. We are glad to report that there has been zero instances of this happening to date. 
  5. Where permitted by law, new Tontine employees are subjected to background checks prior to their first day in the office. 
  • Formal security policies and incident response plan —
    Tontine maintains an independent set of comprehensive security policies that are kept up-to-date to meet the changing security environment, as informed by our internal observations, InfoSec consultants and other stakeholders in the industry. These materials are made available to all employees during training and through the company’s internal knowledge base.
  • Physical security —
    Tontine uses industry-leading cloud platforms (including, but not limited to, Amazon Web Services) to host its production systems for the Tontine platform. Access to these data centers is limited to authorized personnel only, as verified by biometric identity verification measures. Physical measures at these data centers include, but are not limited to, on-premise security guards, closed-circuit video surveillance and extensive intrusion protection measures. Tontine relies on their third-party attestations of their physical security and periodically audits its security reports for compliance. Within our office, Tontine manages visitors, office access, and overall building security via a formal office security program. 
Read More
Read Less


Built to the toughest standards

Your data is yours. Tontine designs, reviews and tests all software for Tontine’s platform using applicable OWASP standards.

Code assessments

The software we develop for Tontine’s platform is continuously monitored and tested using processed design to proactively identify and remediate vulnerabilities. This involves conducting a number of vulnerability assessments, including: 

Pair programming/cross-function peer reviews prior to merging any code to the main codebase. 

Employing third-party software services (like Rainforest QA) to automate source code analyses and find common security defects. 

Employing third-party consulting firms to manually review security-sensitive areas of the codebase. 

Proactively commencing third-party security assessments and penetration tests at least semi-annually.

Read More
Read Less
Bug bounty program

Tontine is currently beta testing a bug bounty program to encourage white-hat penetration tests and the reporting of security issues within the platform.

To join this program or report a newly discovered bug, please email (with the subject line “Bug bounty program”). We aim to respond to all inbound emails within 72 hours.

Read More
Read Less
Legal compliance

GDPR: We comply with GDPR as a data processor, and manage the transfer of data via Standard Contractual Clauses. 

CCPA: We ensure policies, processes, and controls comply with CCPA requirements. We have at least one Data Privacy-focused law firm located in California retained to ensure compliance at all times.

Read More
Read Less
Additional information

If you have any questions about implementing or the implementation of any of these security, privacy and compliance measures, please contact your Tontine Account Manager. If you do not have access to an Account Manager, contact us at Our security measures are constantly evolving to keep up with the changing security landscape. As such, we may update this page from time to time to reflect these technical and organizational changes without prior notice to you.

All information presented on this page is for informational purposes only. As always, the use of Tontine and its associated platforms are subject to the terms, conditions and disclaimers in our Terms & Conditions and Privacy Policy. Where there is a conflict between the information presented on this page and the Terms of Service and/or the Privacy Policy, the Terms of Service and/or the Privacy Policy shall govern.

Make informed pricing decisions, not guesses

We’ll either increase your profit margins, or give you your money back. Requesting a consultation could be the most profitable thing you do this week, and you don’t need to spend a thing!

Secure Free Consultation

100% risk-free with Recoup Guarantee™
Honest & transparent pricing
No-fuss setup: get up and running in 48 hours