|
We Provide HTTPS Connection and End-to-End Encryption
- All connections to our service are through HTTPS.
- Our RESTful APIs require authentication and are accessed via HTTPS.
- The data in our service is encrypted at rest to prevent insider threat actors from obtaining the database.
- We provide end-to-end encryption. Customer traffic coming to our service is encrypted at all times.
|
|
Our AWS Management Console is Not Accessed Externally
- Our cloud-based service is hosted on AWS, which provides encryption of all traffic between all AWS secured facilities.
- Our backend service is not exposed to the public Internet, but accessible through AWS.
|
|
We Treat Your Data and Passwords Securely
- Our service never stores data submitted by our customers. We use it to do verify the credentials and then it is deleted from memory.
- Our service uses masking and obfuscation, and it never requests plain text, hashed passwords, or passwords in any form.
- We stepped up our security, and now our service does not require plain text user ID or complete hash of the user ID to perform user ID and password verification.
- We don’t have visibility over the outcome of the verification process and don’t have a way to know which credentials our customers are verifying or what the outcome of the verification is.
|
|
We Perform Systematic Compromised Account Detection
- We target the biggest cause of massive data breaches, the weak and/or stolen password.
We use our CredMonitor service to detect, verify, and remediate user-centric risks across a broad range of end-points, services, and infrastructure.
|
|
We Offer Enhanced Protection through our On-Premise Solutions
- For the most security-conscious clients, we have an on-premise solution with two form factors - a rackable appliance based on HSM and a smaller form-factor device based on Intel SGX.
|