Unique Identification/User Name.
Password Complexity/ Password Policy.
Protection of Sign-ins by account lock out systems in case of incorrect authentication for certain number of times./p>
Protection of sign-in by SSL Security.
Secured communication through public-key encryption, blocking the use of low cipher strength.
Usage of company hosted and controlled servers and networks for communication.
Server type: Located in SOC 2 Type 2 certified hosting providers.
Next Generation Firewalls.
PCI approved Scanning Vendor for threat protection.
24/7 vulnerability scanning.
Threat protection services to prevent adwares, malwares, Trojans, spyware, phishing attempts.
Role-based Security (allow/deny).
Automatic lock-up of account if not attended for a certain period of time; correct credentials required to use the application again.
Notice given in advance for any change in security protocol.