Security Protocols

correctUnique Identification/User Name.

correctPassword Complexity/ Password Policy.

correctProtection of Sign-ins by account lock out systems in case of incorrect authentication for certain number of times./p>

correctProtection of sign-in by SSL Security.

correctSecured communication through public-key encryption, blocking the use of low cipher strength.

correctUsage of company hosted and controlled servers and networks for communication.

correctServer type: Located in SOC 2 Type 2 certified hosting providers.

correctNext Generation Firewalls.

correctPCI approved Scanning Vendor for threat protection.

correct24/7 vulnerability scanning.

correctThreat protection services to prevent adwares, malwares, Trojans, spyware, phishing attempts.

correctRole-based Security (allow/deny).

correctAutomatic lock-up of account if not attended for a certain period of time; correct credentials required to use the application again.

correctNotice given in advance for any change in security protocol.