Security Aspects
It is paramount to us concern about security aspects of the solution. That's why we have taken all necessary steps to provide a safe and controlled tool.
In this section we describe some of the measures we have taken to ensure privacy and data security of our customers, many billers and payers.
-
Experience:
The solution Central de Pagos Online is based on the EBF platform SDD Latam, which has proven experience with multinational blue chip companies, and therefore is subject to compliance with strict controls are carried out periodically on the application, including those required by the security policy level global Citi, ensuring that it meets the regulations in force in each company.
-
Accomplishment:
- Safety compliance certifications by external (Ethical Hacking Test) are carried out periodically.
- The safety-related functions (controls, restrictions, connections, etc.) are verified and updated semiannually if it becomes necessary.
- Security policies are reviewed and checked annually.
-
Security measures:
There are different levels of security within a solution comprised of these characteristics and Central de Pagos Online treated as high priority.
-
Physical security:
Our solutions are installed on our servers and databases, but housed in a Data Center world-class category, located in Buenos Aires, Argentina. All entrances to the building are controlled and monitored by magnetic cards with different access attributes for staff.
-
Product Safety:
Product safety includes the necessary protection to ensure proper use of licensed modules and configurations.
-
Application Security:
It ensures that the application logic protects the database always looking for that it is updated and validated, regardless of the source of the transaction into account.
-
Access security:
The solution has the tools to verify that anyone who is trying to access the application is allowed according to the attributes and permissions assigned.
-
Business security:
The security business includes users and groups of users to access business functions and data that could be attacked, be altered or captured.
|