Post-Security.jpg

Setting new standards for information security.

From our team of dedicated security and compliance professionals to our advanced technology and hardened policies and procedures, Edenred Pay goes beyond industry standards for privacy and security.

See how we protect sensitive financial information from data breaches and cyberattacks.

text with image or video

Secure Network & Systems

Reduce possible points of failure and attack from bad actors with our firewalls and web application firewalls (WAF).

Secure Network & Systems
text with image or video

Cloud Security

Ensure that different types of data are properly separated, and that appropriate security controls and access policies are applied to each data category with logical separation. 

Cloud Security
grid icons

Data Protection

Protect sensitive financial data with automated retention.  We retain data according to your regulatory and contractual requirements and make it accessible for up to 24 months. 

Encryption

Encryption

Whether data is at rest or in transit, Edenred Pay’s advanced encryption technology and cryptographic keys will help keep it secure.
Clean Desk Policy

Clean Desk Policy

Our Clean Desk policy helps ensure privacy and protect sensitive financial information.
grid icons

Asset Management

From servers, desktops, and laptops to mobile devices, virtual servers, and digital data, Edenred Pay meticulously classifies, manages, and audits assets to protect data and data collections. 

Employee Training

Employee Training

Whether it’s our acceptance use policy for email and web browsing, mobile device handling, or the software our employees are authorized to use, Edenred Pay is committed to reducing the risk of data breaches.
Hardening

Hardening

You can count on Edenred Pay to use the strictest standards and procedures for securing workstations, servers, and network devices.
single rounded cta

Vulnerability Management

We secure our workstations using Next Generation Antivirus (NGAV), Web Filtering, and other endpoint protection tools.  

items list

Best-in-class security controls

  • Access Controls

    – Physical access
    – Role-based and least privilege
    – Password policy
    – Remote access
    – Multi-factor authentication

  • Monitoring

    – Logging
    – Time
    – Scanning and testing
    – Environmental

  • Human Resources

    – Acknowledgements
    – Security policies
    – Comprehensive training
    – Background Checks

  • Business Resiliency

    – Business continuity
    – Disaster recovery
    – Pandemic response
    – Redundancy
    – Data backup
    – Availability
    – Capacity planning

  • Governance & Risk Management

    – Audits

call to action

See for yourself how Edenred Pay can help protect your organization’s sensitive financial information from data breaches and cyberattacks. Contact one of our automation experts to discuss your needs.