Security Center
At Tesote we prioritize the security and privacy of your data. Our commitment to protecting our customers' information is reflected in a robust set of security measures and best practices that we rigorously uphold. Explore the key aspects of our security approach.
Ensure the security of your data
Storage with Amazon Web Services (AWS)
Data is securely stored in Amazon Web Services (AWS) centers in the United States. AWS is the leading cloud service provider, chosen by the world's largest companies to protect their data.
Advanced encryption for maximum security
We employ encryption techniques such as AES-GCM and SHA-256, two of the most secure and reliable encryption algorithms in current technology. Our encryption methods ensure that both data at rest and data in transit are protected against unauthorized access.
Least privilege production and data access
We uphold the principle of Least Privilege, ensuring that employee access is meticulously restricted to their essential job responsibilities. Our access provisioning system is continually reviewed and updated, aligning with this principle to mitigate security risks and safeguard customer data.
Audit records
Transparency and accountability are paramount. We maintain comprehensive audit trails for any changes made to user data, providing an unalterable record of every action that affects financial information. These audit trails serve as a transparent trail of activities, enhancing data security and aiding in compliance.
Multifactor authentication (MFA)
Security is elevated through multi-factor authentication (MFA) for all employee access. MFA strengthens logins by requiring additional verification beyond passwords, reducing the risk of unauthorized access and providing enhanced protection for your data.
Strict change management
The quality of our code is assured through a rigorous change management system that applies coding best practices and rigorous code review. Our continuous integration framework and comprehensive test suite ensure meticulous scrutiny and thorough testing prior to any implementation.
Continuous backups
The availability of your data is guaranteed through continuous data backups to multiple data centers in the cloud. This approach ensures data accessibility even during unforeseen events such as natural disasters or power outages.
HTTPS with secure encryption
Our platform uses HTTPS to encrypt communication between your browser and our servers, protecting your data from eavesdropping and tampering. This includes the use of strict transport security, secure cookies and industry-standard TLS encryption.
Cyber defense robustness
Our application is hardened against a variety of threats, including brute force attacks, DDoS mitigation, IP spoofing, data injection, session hijacking, XSS attacks and more. These measures collectively protect against potential security risks. We use Cloudflare DDoS protection.
List of allowed IP addresses and traffic rate limiting
Our infrastructure incorporates IP allowed lists and traffic rate limiting, which enhances security by controlling access and reducing exposure to potential threats.
Automatic scaling
Our infrastructure features dynamic auto-scaling, ensuring optimal performance during fluctuations in demand. This adaptive approach conserves resources during quieter periods while delivering a seamless user experience.
System strengthening and maximum safety practices
Our security practices include advanced tools that analyze our code base for potential vulnerabilities. This proactive approach identifies and mitigates security weaknesses, strengthening our defenses.
Intrusion detection system (IDS)
Real-time threat detection is facilitated through our Intrusion Detection System (IDS). This system quickly identifies suspicious activity, enabling timely investigation and response.
Encryption at rest and in transit
We employ encryption to safeguard your data both at rest and in transit. Data stored in the PostgreSQL database is encrypted, protecting it from unauthorized access. In addition, data transmitted between our application and the database is encrypted using industry-standard protocols, ensuring that sensitive information remains confidential.
Infrastructure as Code (IaC)
Security is ingrained in our code base through Infrastructure as Code (IaC). This approach ensures consistent security practices across all implementations by embedding security measures directly into our code.
Experience in the regulated financial technology market
Our team has decades of invaluable experience in the highly regulated U.S. technology and finance arena. With years dedicated to the complexities of regulatory compliance, security and data protection, our experts ensure that our practices not only meet but exceed the stringent standards set by regulatory authorities. This proven track record underscores our commitment to providing you with a secure and compliant environment that reflects the pinnacle of excellence in technology.