Security Overview

 

Security is paramount when dealing with financial transactions and payments. For over 10 years, XTRM has developed and deployed the following advanced and qualified integrated security measures. 

 

Complex Password Access

All access is via complex minimum 8 character passwords with numbers and special characters required.


SHA Encryption with Salt

All passwords unencryptable.

Access Lockout

Repeated failed attempts to access system blocks users and is logged.

 

IP Based Access

Specific IP based security for controlled access.


Location Based Access

Location based restrictions


One Time Passwords (2 step authentication)

Device and IP based


Advanced Role Based Access

Strict role based access controls allowing muti-tiered, multi user access.


Real time KYC validation  (Know your customer)

Instant checks on individual and company details during profile setup and payments


Real time AML validation  (Anti money laundering)

Instant rule checks on individual and company payments activity.


Secure Encrypted Data

Data encrypted using state of the art encryption methods static and in transit. Details on request.

 

Regular Independent Site Scans

Regular third party scans of servers using Veracode and Trustwave to ensure no vulnerabilities including static and dynamic scans.

 

Firewall Protection

Secure firewall protection.

 

WEB Application Firewall

Protection against DOS and DDOS attacks, including spam bots and SQL injection attacks.


Physically Secure Servers

All servers in carefully monitored restricted site with secure passkey access.


SOC1 and SOC2 Compliant

Documents on request


PCI Compliant

External vulnerability testing. 


Security Policies

Documented security policies in place.