Secure Architecture
The computers storing your actual account information are not linked directly to the Internet.
- Transactions initiated through the internet are received by online web servers.
- These servers route your transaction through firewall servers.
- Firewall servers act as a traffic cop between segments of our online application network, used to store information, and the public Internet.
- This configuration isolates the publicly accessible web servers from data stored on our application servers and ensures only authorized requests are processed.
Various access control mechanisms, including intrusion detection systems, corporate anti-virus software and more, monitor for and protect our systems from potential malicious activity. Additionally, our online application servers are fault-tolerant, and provide for uninterruptible access, even in the event of various types of failures.