Layers of Security

Layers of Security

Multi-Factor Authentication image

Multi-Factor Authentication

Username and password, time-based one-time passwords, machine biometrics.

Fully Tested Environments image

Fully Tested Environments

Our software is tested by multiple independent third parties for security controls and defects.

Certified image


Our data centers are SOC III compliance.  They are equipped to handle large volumes of financial transactions, securely.

Documented image


We have clearly documented policies covering everything from Disaster Recovery and Security Incidents to Penetration Testing.

High Availability

Load balancing image

We operate fully redundant infrastructure including internet connections, firewalls, load balancers, and servers to ensure our systems are always running and always available.

geographical image

Our data centers are geographically dispersed to prevent outages from natural and man-made disasters.

SQL server image

Leveraging SQL Server’s AlwaysOn and Failover Clustering, we are able to securely store your database in two locations simultaneously.

our network and system image

Our network and systems are actively monitored twenty-four hours a day for unexpected activity.