Discover Trully's robust security protocols ensuring safe and secure API integration.

API Key Authentication

To integrate with Trully, you must first obtain a specially designated API Key for your company. This 40-character alphanumeric key is essential for establishing a secure connection with the Trully platform.

  • Requesting the API Key: Your unique API Key can be requested by contacting our Technical Support team at Upon verification, we will provide you with the key, enabling secure communication with our tools.
  • Header Format: When making requests to our API, include the API Key in the header as follows:
    Header: x-api-key: <your-api-key-string>
  • Security of Your API Key: The API Key is uniquely generated for your company. It is crucial to keep it confidential to prevent unauthorized access. Store it securely and limit its visibility only to those who require it for legitimate purposes.
  • In Case of Compromise: If you suspect that your API Key has been compromised, please contact the Trully team immediately for a replacement at no additional cost at [email protected]. The compromised key will be automatically blocked to prevent any unauthorized use.

ISO 27001 Certified

Our platform adheres to the rigorous standards of ISO 27001, ensuring the highest level of information security management. This certification reflects our commitment to maintaining and continually improving our security protocols, providing you with a trustworthy and secure environment for your data.

Regular Security Audits and Updates

We conduct regular security audits and updates to ensure that our system remains impervious to new threats. This proactive approach guarantees that your data is always protected with the latest security measures.

Data Encryption

All data transmitted to and from our API is encrypted using industry-standard encryption protocols, providing an additional layer of security to your data.

Continuous Monitoring

Our security systems are continuously monitored to detect and respond to any security incidents promptly, ensuring the integrity and confidentiality of your data at all times.