How the Tango Agent Makes Decisions
Tango determines actions based on user input, data on the active page, and through learned behaviors.
You can influence Tango's responses and preferences, including the ability to modify data extraction prompts and provide hints for agent actions.
By default, Tango requires explicit confirmation for critical actions (e.g., saving, deleting) to reduce accidental changes.
Data Processing & Model Usage
Tango only uses trusted model providers, such as Microsoft, OpenAI, Google.
Data Protection with AI Model Providers
We never allow our AI providers to retain or use your data for training or fine-tuning.
Tango provides security features such as Secure Blur and Live Blur to minimize collection of sensitive data.
User Control & Permissions
Role-Based Access Controls (RBAC)
Configure Tango’s access and capabilities based on user roles and organizational policies. Admins can limit what each user group can automate or view.
Workflow-Level Permissions
Admins can manage roles such as Admin, Creator, and Sidekick, and restrict who can edit, view, or share specific workflows or folders.
Workflow editors can permanently redact sensitive or unwanted information from images.
Revoke Tango’s access to any application with a few clicks.
AI Auditability & Observability
Task Execution Observability
Tango executes actions in real-time, giving you a live view of each step. Users can supervise and pause automation at any time.
For certain AI features such as validations, users can override AI suggestions and provide business context for admin review.
Tango provides admins the ability to audit AI responses and user inputs, including the ability to refine rules to improve responses.
Enterprise-Grade Security
Tango undergoes annual audits and penetration tests to consistently meet SOC 2 Type II standards.
Enterprise-Grade Infrastructure
Tango’s infrastructure is hosted on Amazon Web Services (AWS), using an AWS VPC that is not publicly accessible.
Tango regularly runs automated scans to detect and remediate vulnerabilities. We also maintain an A from Qualys/SSL Labs on our applications (
see here).
All company laptops are actively managed and can be remotely wiped. We require screensaver locks, full disk encryption, anti-malware protection, password manager use, and automatic updates to be enabled.
Monitoring & Incident Response
Continuous security monitoring detects anomalies and unauthorized actions. Abnormal behavior triggers alerts for immediate investigation.
Our systems were designed and built with disaster recovery in mind. Tango leverages multiple AWS Availability Zones to redundantly store customer data.
Tango data is automatically backed up daily. Backups are tested to ensure they are working reliably and can be easily restored.