MessageBird

Keep your data safe

We count hospitals, banks and even governments amongst our clients because we are serious about security and privacy. Close attention to local rules and regulations, employee-screening, and data encryption are just a few ways we ensure absolute security and reliability.

Hosting

A secure SSL connection sends your messages to our platform. This platform is hosted in two Tier 3 data centers providing full redundancy. When one data center disconnects, the second takes over all traffic. All data is backed up on a daily basis in a third data center.

SmartRouting

With our unique SmartRouting algorithm we guarantee that all traffic going through our SMS Gateway runs on maximum efficiency. Whenever there’s a hold-up or the quality of a connection gets low, SmartRouting automatically redirects the traffic for optimal service.

Monitoring

We monitor the worldwide performance of our service 24 hours a day, 7 days a week, and our SLA guarantees 99.95% uptime. On the rare occasion that a server goes down or another problem pops up, we directly receive an alert. Our team will take action immediately.

Protected by laws and regulations

ACM Registered

We are registered with the Dutch Authority for Consumers and Markets (ACM). This means we’re always accountable and fully transparent with our clients.

GSMA Membership

We are an Associate Member of the Groupe Speciale Mobile Association (GSMA). The GSMA represents the interests of mobile operators across the globe.

GDPR Compliant

We are always up to the date with all applicable laws and regulations, including the General Data Protection Regulation (GDPR). MessageBird will be compliant by May 25th 2018, when it will apply.

ISO/IEC 27001:2013

All our hosting providers are ISO/IEC 27001:2013 compliant, the globally recognised information security standards for Information Security Management Systems (ISMS).

Your data is safe with us

Screenings

All our employees are screened for expertise, experience and integrity.

Four-Eyes

Whenever dealing with sensitive information or taking critical action, we use the four-eyes principle.

Need-to-know

We provide access to sensitive data only on a need-to-know basis.