Security & Compliance

Trust Built on Security

Enterprise-grade security, regulatory compliance, and data protection. Your customers' trust is our highest priority.

NBE Licensed
Payment System Operator
ISO 27001
Information Security
PCI DSS
Payment Card Security
SOC 2 Type II
Service Organization

Enterprise-Grade Security

Multiple layers of security protect every transaction and data point in our system

End-to-End Encryption

All data encrypted with AES-256 at rest and TLS 1.3 in transit. Bank-grade security for every transaction.

AES-256 encryptionTLS 1.3 protocolKey rotationHSM integration

Multi-Factor Authentication

Secure access with MFA, biometric verification, and hardware security keys.

SMS/Email OTPAuthenticator appsBiometric supportHardware keys

Real-Time Monitoring

24/7 security monitoring with AI-powered threat detection and instant alerts.

24/7 SOCAI threat detectionAnomaly detectionInstant alerts

API Security

Secure API access with hashed keys, IP whitelisting, and granular permissions.

Hashed API keysIP whitelistingRate limitingAudit trails

Regulatory Compliance

Full compliance with NBE regulations, international standards, and industry best practices

NBE Compliance

Compliant

Fully licensed and compliant with National Bank of Ethiopia regulations for payment system operators.

Payment System Operator License
Regular regulatory reporting
Capital adequacy requirements
Operational risk management

KYC/AML

Implemented

Comprehensive Know Your Customer and Anti-Money Laundering procedures to prevent financial crime.

Customer identification
Document verification
Sanctions screening
Transaction monitoring

Data Protection

Certified

Strict data protection policies aligned with international standards and local regulations.

Data minimization
Consent management
Right to erasure
Data portability

Audit & Reporting

Automated

Complete audit trails and regulatory reporting for full transparency and accountability.

Immutable audit logs
Regulatory reports
Compliance dashboards
External audits

Continuous Security

Security is not a one-time effort. We continuously monitor, test, and improve our security posture.

Penetration testing every quarter
Vulnerability assessments monthly
Security awareness training
Incident response procedures
Business continuity planning
Disaster recovery testing
Third-party security audits
Bug bounty program

Report a Vulnerability

Help us keep the platform secure

If you discover a security vulnerability, please report it responsibly. We have a bug bounty program for qualifying reports.

Your Security is Our Priority

Have questions about our security practices or compliance? Our security team is ready to help.