bamboo icon white

Simplify lead generation, improve your digital presence, and generate new business with digital marketing technology designed to help you accelerate growth.

eMoney Logo
Magnifying Glass Icon
Mobile Menu Icon Close Mobile Menu Icon
Arrow Icon


eMoney Advisor, LLC – Data Security You Can Trust

eMoney Advisor understands that the confidentiality, integrity and availability of our customers’ information is vital to their business operations and our own success. To protect that key information, we use a multi-layered approach and constantly monitor and improve our application, systems and processes to quickly address potential security demands and challenges.

Secure Data Centers and Connections

Our data service is stored in dedicated spaces at top-tier data centers. These facilities provide a number of data protection and recovery services, including:

Secure data transmission and sessions
  • Connection to the eMoney Advisor environment via the latest TLS
  • Individual user sessions identified and re-verified with each transaction, using a unique token created at login
Guaranteed network protection
  • Perimeter firewalls and edge routers block unused protocols
  • Internal firewalls segregate traffic between the application and database tiers
  • Intrusion detection sensors throughout the internal network report events to a security event management system for logging, alerts and reports
  • A third-party service provider scans the network externally and alerts us of changes in baseline configuration
Reliable disaster recovery and data backup protocols
  • Real-time replication to disk at each data center, and hourly data replication between the production data center and the disaster recovery center
  • Data transmitted across encrypted links
  • Data is backed up using EMC Data Domain on a weekly rotating schedule of incremental and full backups
  • Backups are sent electronically over secure links to secure secondary data center for offsite storage
  • Annual disaster recovery tests verify our projected recovery times and the integrity of the customer data
Building access control and physical security protocols
  • 24-hour manned security, including foot patrols and perimeter inspections
  • Video surveillance throughout facility and perimeter
  • Biometric scanning for access
  • Dedicated, concrete-walled data center rooms
  • Computing equipment in access-controlled steel locked racks
  • Building engineered for local seismic, storm, and flood risks
  • Tracking of asset removal
Environmental controls
  • Humidity and temperature control
  • Redundant (N+1) cooling system
Fire detection and suppression
  • VESDA (very early smoke detection apparatus)
  • Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression
Protected power source and backup systems
  • Underground utility power feed
  • Redundant (N+1) CPS/UPS systems
  • Redundant power distribution units (PDUs)
  • Redundant (N+1) diesel generators with on-site diesel fuel storage
Network connection reliability
  • Redundant internal networks
  • Network neutral, connecting to all major carriers and located near major Internet hubs
  • High bandwidth capacity

Internal and Third-party Testing and Assessment

In addition, eMoney Advisor regularly tests and monitors all systems, data and personnel for potential security risks:

Strict internal monitoring
  • Information Security department tests all code for security vulnerabilities before release and continually monitors notifications and alerts from internal systems to identify and manage threats
Personnel you can trust
  • Comprehensive background checks conducted on all employees as a condition of employment
Annual third-party assessments
  • SOC 2 audit to ensure our company and datacenters are compliant
  • Application vulnerability threat assessments
  • Network vulnerability threat assessments
  • Selected penetration testing and code review
  • Security control framework review and testing

Combined, eMoney’s internal and external data and systems security protocols offer protection you and your clients can trust.