Make monday.com work with Microsoft 365 & SharePoint →
Translate logo

Translate

Cloud Fans

575 installs, since March 15, 2023.   19 installs/month.   Updated July 31, 2025.

Paid No touch

Streamline cross-lingual communication and increase productivity with support for over 75 languages

Are you tired of copying and pasting text or relying on in-browser translation for specific fields or updates? Say hello to Translate!


This translation app enables you to translate text instantly and automatically within your boards, making it easy to keep your content up-to-date and multi-lingual.


Features:

🌐 75+ Languages supported

No matter if you need to translate English, German, Arabic, Japanese, Chinese, or any of the over 75 supported languages, this app has you covered with its bi-directional translation feature.

🌐 Easy, Instantly and with automation

With this app, translation is a breeze. Install it, set up your integration rules, and watch as your text is translated in a matter of seconds.

🌐 Auto-detect input language

Picture this: you receive emails or form submissions in an unknown language and need to translate them. With this app's automatic language detection feature, you can easily identify the input language and translate the text with ease.

🌐 Formal and informal speech

Some languages, such as German and Japanese, have distinct formal and informal speech. Whether you want to communicate casually with your teammates or maintain a professional tone with your business partners, this app has got you covered with its support for both types of speech.

🌐 Lengthy texts

Whether you need to translate a single word or lengthy emails and texts, this app has got you covered. It supports up to 10,000 characters, which is roughly equivalent to 1,500 words.


If you would like to see the app in action before installing, we'd be happy to schedule a free demo with you. Our team will walk you through how the app works and answer any questions you have. Just let us know when you're ready!

Security & Compliance

Security

Does the developer periodically perform penetration testing?

Not answered

Does the developer have a dedicated security and privacy point of contact for such issues or questions?

Not answered

Does the app restrict redirects and forwards only to approved destinations, or show a warning when redirecting to potentially untrusted content?

Yes
To ensure that redirects and forwards only allow destinations that appear on an allow list or show a warning when redirecting to potentially untrusted content, our app implements the following measures: Translate App Integration: The app only accepts webhook triggers from Monday.com. Internal Redirects: Any internal redirect within the same domain will only happen to trusted destinations that are whitelisted. This helps to ensure that redirects are directed only to trusted pages or destinations within the same domain. External Redirects: For external redirects, only whitelisted destinations are allowed. If the destination is not on the whitelist, a warning is displayed to the user before redirecting to an untrusted page. By implementing these measures, we can prevent unauthorized access and ensure that users are only redirected to trusted and verified pages or destinations. This helps us to maintain the security of our application and protect against potential security threats such as phishing attacks or other unauthorized access attempts.

Does the app protect against mass parameter assignment attacks?

Yes
To protect against mass parameter assignment attacks, our app uses the following techniques: Validation and sanitization of input parameters: We validate and sanitize all input parameters to prevent unauthorized access to sensitive data. This helps to ensure that input parameters are within acceptable ranges and that any malicious input is detected and discarded. Whitelist approach: We use a whitelist approach to restrict input parameters to only those that are necessary for the application to function. This helps to ensure that input parameters cannot be used to access or modify sensitive data. Mapping input data to model objects: We map input data to model objects, which are designed to store only the data that is necessary for the application to function. This helps to ensure that sensitive data is not exposed to unauthorized users and that any unauthorized modifications to data are detected and prevented. By using these techniques, we can protect against mass parameter assignment attacks and prevent unauthorized access to sensitive data. This helps us to maintain the confidentiality and integrity of customer data and meet compliance requirements.

Does the app perform encoding and sanitization on all user supplied parameters to protect against Cross-Site Scripting?

Yes
We perform XSS (Cross-Site Scripting) encoding and sanitization on all user-supplied parameters by: Validating input that is received to ensure that it meets expected criteria. Checking against validation schemas to verify that the input is of the correct type and format. By performing XSS encoding and sanitization, we can prevent malicious user input from being executed reducing the risk of XSS attacks.

Does the developer protect all state-changing actions against Cross-Site Request Forgery (CSRF)?

Yes
To protect against CSRF, we use the following measures to protect all state-changing actions: We check JWT tokens to ensure that the request was initiated by an authenticated and authorized user. We verify the audience in JWT tokens to ensure that the request was made to the correct endpoint. We discard requests with invalid or expired tokens to prevent unauthorized access to state-changing actions. We log discarded events for review, so we can monitor for any potential attacks and take appropriate actions to prevent future attacks. By using these measures, we can ensure that state-changing actions are only initiated by authorized and authenticated users, and that the risk of unauthorized access to these actions is minimized.

Does the developer have mechanisms to notify monday.com in case of a security breach?

Yes
In the event of a security breach, we would follow the following steps to notify monday.com: We use active monitoring services like CloudWatch & CloudTrail to quickly detect any potential security incidents or breaches. If we detect any security related events or incidents, we would immediately report them to the contacts that monday.com provides, which may include submitting a ticket, sending an email, or making a phone call to the designated security contact. By following these steps, we can ensure that any potential security breaches are detected and reported to monday.com in a timely manner, allowing us to work together to mitigate the impact and prevent any further damage.

Does this developer have a process for installing application-level updates and security patches for the service (such as software packages and databases)?

Yes
We have a process for installing application-level updates and security patches for our service that involves: Using AWS Lambda with the latest Python runtimes, which are automatically updated by AWS and ensure that our code is always running on the latest software versions. Updating Python modules like boto3 to the latest versions by adding additional Lambda Layers, which can be easily added or removed as needed. Using a managed database (DynamoDB), which is automatically updated and patched by AWS to ensure that our database is always running on the latest software versions. Only using DynamoDB to store app events (install, uninstall) and no customer data, which reduces the potential impact of any security vulnerabilities on our customers' data. By following this process, we can ensure that our application-level software packages and databases are regularly updated and patched to help protect against potential security vulnerabilities.

Compliance

Is the app certified with the information security standard ISO/IEC 27001:2022?

Not answered

Is the app compliant with the Health Insurance Portability and Accountability Act (HIPAA)?

Not answered

Is the app certified with System and Organization Controls (SOC 2 or SOC 3)?

Not answered

Is the app compliant with the General Data Protection Regulation (GDPR)?

Not answered

Data

Does the app send any data outside of monday.com? If yes, indicate whether the data is customer-submitted (e.g., board names, item names, doc content) or non-customer-submitted (e.g., account ID, board ID, user ID).

Not answered

Where does the app store logs data?

Not answered

Where does the app store the app data?

Not answered

Does the developer ensure application logs do not contain secrets or personally-identifiable information (PII)?

Yes
To ensure that logs do not contain secrets and PII (Personally Identifiable Information), we use the following techniques: Masking and filtering: We use Lambda functions to mask and filter sensitive data from logs, including PII and secrets. This helps to ensure that this data is not stored in logs and is not accessible to unauthorized users. In addition, we have a logging class that supports different log levels (debug, info, warning, critical, and error), and for production, we only activate the necessary log level. This helps us to prevent the logging of unnecessary or sensitive data, reducing the risk of unauthorized access to logs. By using these techniques, we can ensure that logs do not contain sensitive data, including PII and secrets, and that any unauthorized access to log files is prevented. This helps us to maintain the confidentiality and integrity of customer data and meet compliance requirements.

Is customer data segregated from the data of other customers (for example logically or physically)?

Yes
To segregate customer data from the data of other customers, our approach involves not storing customer data in the backend, structuring our code in a multi-tenant way, and not saving tokens. Instead, we use short-lived JWT tokens that are verified and used to update specific columns. These measures ensure that customer data is kept separate from the data of other customers and that the risk of data breaches and unauthorized access is eliminated.

Privacy

Does the developer enforce multi-factor authentication on employees access to systems which may process customer data?

Yes
Our employees' authentication method for accessing systems that may process or hold customer data includes: A strong password policy that enforces the use of complex passwords and regular password rotation to prevent unauthorized access. Enforced use of MFA (Multi-Factor Authentication) for all users to access our systems that process or hold customer data. No SDK access for regular users, with access restricted to specific roles. Users need to have permission to assume a specific role, which is granted based on their job function and the resources they require access to. By using a strong password policy, regular password rotation, and enforced use of MFA, we can ensure that only authorized individuals have access to systems that process or hold customer data, and that any unauthorized access attempts are detected and prevented. Additionally, restricting SDK access to specific roles and requiring permission to assume a role helps us to control access and maintain the confidentiality and integrity of customer data.

Does the developer protect access to customer data based on the principle of least privilege?

Yes
Data is restricted to only privileged employees who require access to perform their job functions. We use IAM, MFA, and fine-grained user permissions to control and monitor access to customer data. Developers are separated by using production and staging areas to ensure that no unauthorized data access occurs. By using these measures, we can maintain the confidentiality and integrity of customer data, and prevent unauthorized access.

Reviews

No reviews yet.

Historical data

Installation history

We have data for December 28, 2024 onwards only. Collected sometime after 00:00 UTC daily.

Total number of installs

Change in total number of installs in last 7 days

Compares the number of installs on each date with 7 days previously:

Max
Min
Current

Change in total number of installs in last 30 days

Compares the number of installs on each date with 30 days previously:

Max
Min
Current

Change in total number of installs in last 90 days

Compares the number of installs on each date with 90 days previously:

Max
Min
Current

Ratings history

Categories history

Each of the following is a yes/no answer, so the graphs show 1 for yes, and 0 for no.

In "Featured" category?

In "Editor's choice" category?

In "Trending this week" category?

App metadata

ID: 10000180App ID: 10055462Listing updated: October 13, 2024