eMoney Advisor understands that the confidentiality, integrity and availability of our customers’ information is vital to their business operations and our own success. To protect that key information, we use a multi-layered approach and constantly monitor and improve our application, systems and processes to quickly address potential security demands and challenges.
Secure Connections
Secure data transmission and sessions
Connection to the eMoney Advisor environment via the latest TLS
Individual user sessions identified and re-verified with each transaction, using a unique token created at login
Network protection
Perimeter firewalls and edge routers block unused protocols
Internal firewalls segregate traffic between the application and database tiers
Intrusion detection sensors throughout the internal network report events to a security event management system for logging, alerts and reports
A third-party service provider scans the network externally and alerts us of changes in baseline configuration
Reliable disaster recovery and data backup protocols
Real-time data replication between geographically dispersed regions
Data transmitted across encrypted links
Annual disaster recovery tests verify our projected recovery times and the integrity of the customer data
Network connection reliability
Redundant internal networks
Network neutral, connecting to all major carriers and located near major Internet hubs
High bandwidth capacity
Internal and Third-party Testing and Assessment
In addition, eMoney Advisor regularly tests and monitors all systems, data and personnel for potential security risks:
Strict internal monitoring
Information Security department tests all code for security vulnerabilities before release and continually monitors notifications and alerts from internal systems to identify and manage threats
Personnel you can trust
Comprehensive background checks conducted on all employees as a condition of employment
Annual third-party assessments
SOC 2 audit to ensure our company and datacenters are compliant
Application vulnerability threat assessments
Network vulnerability threat assessments
Selected penetration testing and code review
Security control framework review and testing
Combined, eMoney’s internal and external data and systems security protocols offer protection you and your clients can trust.
Our site uses cookies. By continuing to use our site, you are agreeing to our Cookie Policy.