A web protocol with additional SSL security (Secure Socket Layer) that protects and encrypts all sensitive information such as credit card numbers, passwords, etc.
All databases are encrypted with AES-256, data-level storage encryption. All database backup files are stored in an encrypted format similarly. The same standard used banks major banks across the world.
Passwords are stored with strong one-way encryption, Bcrypt with salt & pepper.
A security process in which all login attempts require login credentials and a second authentication factor (2FA).
Prevention from cyber attacks and scams that could infect a computer with malware.
Implementation of session timeouts where users will be logged out of system.
Following ISO 27001 Security practices for Information Security Management Systems.
Engineering teams are security subject-matter experts from Silicon Valley and are continuously monitoring and updating security systems for safeguarding your sensitive data and information.
SOC 2 defines criteria for managing customer data based on five “trust service principles” - security, availability, processing integrity, confidentiality and privacy.
Our engineering team has gone to great lengths to setup additional infrastructure, to ensure that our systems are always available and functioning. We utilize three architectural principles to achieve this
At geographically distributed data centers around the world, we have identical setup of our services to serve traffic.
At each location, we have redundant instances of our services. If problems are detected on main instances, traffic will be switched over to follower instances immediately without delay.
Our traffic is routed globally by load balancers. As traffic loads increase, traffic will be re-routed by our load balancers to other data centers to ensure fast response times for all our services.