Our Security


Security and performance Experience security, reliability and enterprise level control

Tib’s best-in-class security and performance practices ensure the highest standards and continuity of service at all times, while protecting and limiting access to accounts payable and vendor information.


ROLES-BASED AUDIT AND SECURITY JOURNALS
We collect network, system and application logs in a central location for continuous monitoring.

Our automated audit systems analyze logs in real time in order to detect cyberattacks.


OUR ENCRYPTION LEVEL
All data is collected and transmitted securely via HTTPS and personally identifiable information is stored and encrypted using AES,
Same encryption level as the one used by industry leaders such as Amazon and PayPal.


OUR STANDARDS AND CERTIFICATIONS
Based on the highest performance Cloud standards, TIB complies with SSAE 16 SOC and ISAE 3402 Type II certification.
Our infrastructures: comply with the PCI DSS 3.1 standard, which is the most demanding in the financial industry.



OUR CLOUD PLATFORM IS ALWAYS AVAILABLE
In accordance with industry standard best practices, the database is automatically backed up every 5 minutes and the entire system image is saved every 5 minutes.
To protect against loss, an off-site secondary environment is located in another location so that we can restore TIB systems with minimal disruption in the event of a disaster. Processes are continuously tested and optimized to ensure the highest level of service.

UPTIME RATE
TIB’s Cloud platform is fault-tolerant, highly available and fully redundant for optimal performance and security. With 99.99% SLA (out of scheduled maintenance), we ensure high availability and reliable performance for our customers worldwide.



Our security systems are at the cutting edge of technology. Why ?

TIB uses multifactor authentication and IP restrictions for additional controls and peace of mind. We are also subject to regular audits and intrusion tests to ensure the security of all customer data and funds.

The options


SPEECH RECOGNITION
Voice recognition allows us to properly identify our customers without having to ask several security questions.

ACCESS TO OUR PORTALS
We have state-of-the-art systems to control security. Only authorized systems can trade with TIB. Our proprietary encryption allows us to protect your data.

HIRE AN EMPLOYEE
Want to know its history and see if it’s the right person for your business? Consult our data systems.

REQUEST FOR PRODUCT DEMONSTRATION

Contact us today to schedule a demonstration and find out if TIB can help you automate your processes.

CAPTCHA

Enter the following code: captcha