At Zamp, we understand the importance of security when it comes to handling financial data. We take our responsibility to protect your data very seriously and have implemented a number of security measures to ensure that your financial information is safe. Our security perimeter is air-tight, meaning that it is very difficult for unauthorized individuals to access your data. We also have a team of security experts who are constantly monitoring our systems for any potential threats.
In addition to our security measures, we also take a proactive approach to data protection. We regularly review our security policies and procedures to make sure that they are up-to-date and effective. We also work closely with our customers to ensure that they are aware of the latest security threats and best practices. We understand that you need to be able to focus on building your business, without having to worry about the security of your financial data. That's why we take care of it for you.
Data-in-transit: All our communications at transit external or internal are done via secure and encrypted channels.
Data-at-rest: We use the Advanced Encryption Standard (AES) algorithm with a key size of 256 bits and with a unique and proper encryption key rotation policy for each customer.
Your data is secure on our platform. All the data you’ve uploaded can only be accessed only by you.
At our network layer, we use Firewall to protect your data from all possible threats. In addition, we have other solutions to detect Virus and Malware on the host systems. These include IDS (Intrusion Detection System) and IPS (Intrusion Prevention System). All new vendors, assets and activities pertaining to processing financial data are subject to a review of privacy, security and compliance.
We encourage ethical hackers to report any security vulnerabilities they find in our systems to us through our responsible disclosure policy.
Our policy can be found here. Ethical hackers who report vulnerabilities to us in accordance with our policy will be acknowledged and rewarded.
We also welcome ethical hackers to collaborate with us to help us strengthen our security perimeter.