Secure and Reliable Infrastructure

We are committed to our customers' security.

This is why we complete annual, independent third-party audits and put security at the centre of our processes.

We have proactive technology standards.

Our dedicated security and engineering teams have adopted coding best practices, code design review and controls on sensitive data and cryptographic keys. We also perform risk assessments of our vendors to make sure our entire system and its dependencies work safely.

Automated security controls

We protect your data with encryption at rest, logging and audit practices and have mandatory two-factor authentication. Our secure system uses 24/7 automated monitoring for threats and anomalies.