Platform
PRODUCT FEATURES
users
Participant CRM

The powerhouse of your Research Operations.

envelope
External Recruitment

Recruit from a panel of 3M+ participants.

calendar
Scheduling

1:1, collective, and round robin interviews.

file-alt
Study Management

Interviews, unmoderated tests, surveys & focus groups.

gift
Incentives

Automatically send global incentives.

grid-2
Panel Management

Manage multiple panels of your own users.

award
Governance

Protect your most precious asset - your users.

browser
Dashboards

Steer your Research practice with clarity.

video
Observer Rooms

Invite teams to watch live user research.

PLATFORM
clone
Integrations

Leverage the tools you already use to do better Research, faster.

shield
Security

Enterprise grade security to keep your Research compliant.

Spring 2025 Release

Self-serve research made possible (and safe).

Learn more
Why Rally?

Enabling world-class teams to run research at scale.

Learn more
Solutions for
use cases
screen-users
Rally for Enterprise Teams

Talk to users at scale.

tools
Research Operations

Increase Research throughput safely.

user
User Research

Pick your method, recruit, and launch your study.

presentation
Product Management & Design

Unlock continuous product Research.

The ReOps Playbook

Your comprehensive guide to mastering effective research practices.

Learn more
Resources
learn & connect
heart
Our Customers

See how leading teams are levelling up Research.

pen-to-square
Blog

Insights, news, and resources from Research professionals.

calendar-days
Events

Get caught up on and register for our latest virtual events.

Support
list-check
Changelog

View monthly product updates.

circle-info
Help Center

Access comprehensive help articles to get the most out of Rally.

message
Rally's Support

Read more about Rally’s role in your ReOps success.

Demo Center

Explore key workflows in Rally with self-guided, interactive tours.

Learn more
Plans
LoginProduct TourGet a Demo

Security and Data Policy

Effective: February 22, 2022

Organizational Security

Information Security Program

Rally has an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.

Third-Party Audits

Our organization undergoes independent third-party assessments to test our security and compliance controls.

Third-Party Penetration Testing

Rally conducts annual independent third-party penetration testing to ensure the security of our services, your data, and your customer's data.

Roles and Responsibilities

Roles and responsibilities related to our Information Security Program and the protection of your data and your customer's data are well defined and documented. Our team is required to review and accept all of the security policies.

Security Awareness Training

Rally employees are required to go through employee security awareness training annually. These trainings cover industry best practices and information security topics such as phishing and password management.

Confidentiality

All team members are required to sign and adhere to an industry standard confidentiality agreement prior to their first day of work.

Background Checks

We perform background checks on all new employees and contractors in accordance with local laws.

Cloud Security

Cloud Infrastructure Security

All of our services and databases are hosted on Heroku. They employ a robust security program with multiple certifications. For more information on our provider's security processes, please visit Heroku Security.

Data Hosting Security

All of our customer data is hosted on Heroku Postgres databases. Customer data is stored in separate access-controlled databases per application. Each database requires a unique username and password that is only valid for that specific database and is unique to Rally's application. Please see Heroku's Security page for more information.

Encryption at Rest

All databases are encrypted at rest with AES-256, block-level storage encryption.

Encryption in Transit

All data in-transit is secured using TLS/SSL only. Rally uses HTTPS for our web app and SSL database connections to protect sensitive data transmitted to and from applications.

Vulnerability Scanning

We perform frequent vulnerability scanning on our services and actively monitor for threats like OWASP Top Ten vulnerabilities.

Logging and Monitoring

We actively monitor, alert and log our cloud services in production.

Business Continuity and Disaster Recovery

We use Heroku's backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.

Incident Response

Rally has a formal Information Security Policy and Incident Response Plan. Our process for handling information security events includes escalation procedures, rapid mitigation and communication.

Access Security

Permissions and Authentication

Access to our cloud infrastructure, databases, and other sensitive services are limited to authorized employees who require access in order to do their job.

Where available, we have Single Sign-on (SSO), 2-factor authentication (2FA) and strong password policies to ensure access to cloud services are protected.

Least Privilege Access Control

We follow the principle of least privilege with respect to identity and access management.

Quarterly Access Reviews

We perform quarterly access reviews of all team members with access to sensitive systems.

Password Requirements

All team members are required to adhere to a minimum set of password requirements and complexity for access.

Password Managers

All company issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.

Vendor and Risk Management

Annual Risk Assessments

We undergo at least annual risk assessments to identify any potential threats, including considerations for fraud.

Vendor Risk Management

Vendor risk is determined and the appropriate vendor reviews are performed prior to authorizing a new vendor.

Contact Us

If you have any questions, comments or concerns or if you wish to report a potential security issue, please contact security@rallyxur.com.

Join the future of Research Operations. Your peers are already here.

Spreadsheets are out. Research Operations Platforms are in. Sign up for a live demo to see how Rally is transforming the way teams streamline workflows, enhance collaboration, and scale their impact.
Request a 14-day trial
Platform
Why Rally?PlansReOps: Use CaseResearch: Use CaseProduct: Use Case
Features
Participant ManagmentStudy ManagementSchedulingIncentivesPanel ManagementGovernance
Customers
Our CustomersRally for EnterpriseCase Study: WebflowCase Study: EzCater
Resources
Demo CenterBlogSecurityHelp CenterChangelogRally vs UserInterviewsRally vs EthnioRally vs Great Question
Company
CareersRequest DemoLoginContact
© 2025 Rally HQ, Inc. All rights reserved.
Terms of Use
|
HIPAA Policy
|
Privacy Policy
|
Accessibility Policy
|
Security