At MX, we’ve spent years building robust security protocols that leverage best practices and exceed industry benchmarks. Here are six areas that illustrate the strength of our security.
- Systems Development Life Cycle Controls
- Security Operations
- Human Resource Controls
- Risk Analysis
- Physical Security
Let’s look at each point in detail.
When it comes to compliance, MX exceeds industry standards. We maintain SOC 2 compliance with a focus on privacy, confidentiality, availability and security criteria. In addition, our products and platforms are PCI compliant, which means that all client data is secure on an ongoing basis. We also require that our digital banking partners meet these same standards for SOC 2 and PCI compliance, ensuring that our system is safe from top to bottom.
2. Systems Development Life Cycle Controls
We integrate security standards into every stage of our systems development life cycle (SDLC). From our roadmap and design phase to development and release, we keep security at the forefront. As part of this methodology, we employ a multistage testing protocol for feature requests, bug fixes, style changes, and library updates. We also apply manual and automated code security reviews and validate all code functionality, integration, and secure coding techniques. Finally, we maintain all of these controls while keeping a development speed that consists of many releases to production per day.
3. Security Operations
The security operation team at MX goes the extra mile in protecting our live product offerings. Every product and feature set has specific owners and custodians that are accountable for systems and data. The team also conducts comprehensive security monitoring programs and stands by to remedy potential intrusions or data leaks.
4. Human Resource Controls
We provide comprehensive training on security awareness to MX personnel. In addition to general security curricula and advanced topics on code and operations security, MX regularly provides hands-on opportunities for employees to test their awareness in social engineering trials. MX conducts full background checks and enforces strong access control management and termination procedures.
5. Risk Analysis
MX validates the effectiveness of its security program annually. We know that security is never a once and done endeavor, and the challenges of providing proven security controls with sufficient rigor is demanding. Fortunately, we have a security-minded culture that starts with the newest employee and culminates with insightful C-level officers who understand the critical need for information security.
We also employ third-party consulting, internal testing, and a comprehensive risk analysis process to identify and ameliorate gaps resulting from changes in the security landscape or the MX security posture. MX maintains and regularly tests its risk management, disaster recovery, and business continuity plans.
6. Physical Security
Because we store and process all client data in a Tier-3 certified data center on MX-owned hardware, we take physical security seriously. Photo ID badges must be worn at all times by all employees and visitors, and the number of visitors is tightly controlled. All systems and data housed at collocations are protected by CCTV, biometric access controls, and dedicated cages.
If you’re a prospective client who would like more information about our security procedures, we will provide additional details about these and other aspects of our program. For more information about security at MX, please contact your account representative or send an inquiry directly to security@MX.com.