Industry-leading security and compliance standards

We understand that you want to buy the best technology stack and not run into any risks. Rattle is a true value-add & doesn't open doors for problems.

Data Integrity

Rattle adapts to your data permissions and policies, so you don’t need to worry about rogue software. You’re always in control.

We do not store customer data

Think of Rattle as middleware between Salesforce and Slack. Our software operates as a conduit and does not store customer data from Salesforce, Slack, or Google Calendar.

SFDC permissions, honored

Rattle’s access to records and fields is controlled by your Salesforce permissions. Our software will never bypass these parameters, which means that you’ll always have control over access.

OAUTH 2.0 API calls, only

Rattle uses OAUTH 2.0 for authorization with Salesforce, Slack, and calendar platforms. With every connection, Rattle will only request authorization using vendor-specific SSO APIs.

Application Security

Rattle conforms to leading security standards and best practices, so you don’t need to worry about sloppy systems or additional liability.

Encryption at REST

All stored data, session cookies, and backups are encrypted at rest. Database fields storing credentials are also encrypted for additional security. No humans, Rattle's staff included, can ever view your passwords.


Rattle integrates with your SSO/MFA solution to provide a seamless login experience via SAML 2.0. User authentication can take place without the need to manage yet another account/password combination.

Encryption in Transit

All communication between customer systems and Rattle takes place using high levels of encryption (TLS 1.2/HPPS).

Role-based access controls

Rattle administrators can set user roles according to the principle of least privilege. Users only see what they need in order to perform their jobs.

Third-party Penetration Testing

Rattle partners with external penetration testing vendors to conduct annual tests. Medium and higher severity findings are remediated, with reports available upon request and under NDA.

Vulnerability scanning

Rattle scans its own systems regularly to identify common vulnerabilities. Servers are patched automatically on a regular schedule, with critical and high severity patches applied with the highest priority.


We know your business operations are mission-critical — your company operations are in good hands with Rattle.

Thorough backups

Rattle runs backups daily, encrypted in transit and at rest, with regular tests. Backups reside "off-site" from our offices, on Amazon S3 servers that store files on multiple devices.

Data centers

Rattle hosts customer data in the United States, in AWS’s us-west-oregon region. For more information about AWS data center capabilities and compliance, refer to AWS’s data center information page.


Rattle reviews and updates its Business Impact Analysis (BIA) and Business Continuity Plan (BCP) on an annual basis. Our team has developed a process to provide well-defined Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). Reports are available upon request and under NDA.

Incident handling

Rattle maintains ongoing documentation and verification of its incident response policy and procedures. We apply a 6-step approach including preparation, identification, containment, eradication, recovery, and lessons learned to ensure consistency and ongoing improvements to our response process.

Continuous Security Monitoring

We take our security measures seriously with an 'always on' mindset & take active steps to avoid risk.

Information security program

We have an information security program in place, communicated throughout our organization. Our information security program follows the criteria set forth by SOC 2.

Third-party audits

Rattle undergoes independent third-party assessments to test security controls. Reports are available upon request, under NDA.

Security awareness training

Rattle team members go through regular security awareness trainings covering industry standard practices and information security topics.

Background checks

All new hires undergo a background check prior to starting their employment with Rattle.

Roles and responsibilities

Our InfoSec program follows a process of careful planning. Roles and responsibilities related to customer data protection are well-defined and documented.

Still have questions?

We are happy to provide any answers you need.

Email us at

Get more headspace back in your day with Rattle.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.