Protecting Your Data Privacy with Encryption and Compliance

vectorstock_20196560 copy.png

DATA ENCRYPTION

Secure Transfer Encryption with HTTPS

A web protocol with additional SSL security (Secure Socket Layer) that protects and encrypts all sensitive information such as credit card numbers, passwords, etc.

Advanced Data Encryption Standard

All databases are encrypted with AES-256, data-level storage encryption. All database backup files are stored in an encrypted format similarly. The same standard used banks major banks across the world.

Safe Passwords

Passwords are stored with strong one-way encryption, Bcrypt with salt & pepper.

PRIVACY

Multi-factor Authentication

A security process in which all login attempts require login credentials and a second authentication factor (2FA).

Phishing Attack Security Education

Prevention from cyber attacks and scams that could infect a computer with malware.

Session Duration Management

Implementation of session timeouts where users will be logged out of system.

COMPLIANCE

Best Practices to Secure Business Information

Following ISO 27001 Security practices for Information Security Management Systems.

Security Subject-Matter Experts

Engineering teams are security subject-matter experts from Silicon Valley and are continuously monitoring and updating security systems for safeguarding your sensitive data and information.

SOC 2 Compliance

SOC 2 defines criteria for managing customer data based on five “trust service principles” - security, availability, processing integrity, confidentiality and privacy.

24/7 ARCHITECTURE

Our engineering team has gone to great lengths to setup additional infrastructure, to ensure that our systems are always available and functioning. We utilize three architectural principles to achieve this

Globally Distributed Setup

At geographically distributed data centers around the world, we have identical setup of our services to serve traffic.

Highly Available Architecture

At each location, we have redundant instances of our services. If problems are detected on main instances, traffic will be switched over to follower instances immediately without delay.

Load-Balanced Traffic

Our traffic is routed globally by load balancers. As traffic loads increase, traffic will be re-routed by our load balancers to other data centers to ensure fast response times for all our services.