<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=142903126066768&amp;ev=PageView&amp;noscript=1">

Security at MX: How We Protect Your Data

Jul 22, 2015 10:13:26 AM

At MX, we’ve spent years building robust security protocols that leverage best practices and exceed industry benchmarks. Here are six areas that illustrate the strength of our security.

  1. Compliance
  2. Systems Development Life Cycle Controls
  3. Security Operations
  4. Human Resource Controls
  5. Risk Analysis
  6. Physical Security

Let’s look at each point in detail.

1. Compliance

When it comes to compliance, MX exceeds industry standards. We maintain SOC 2 compliance with a focus on privacy, confidentiality, availability and security criteria. In addition, our products and platforms are PCI compliant, which means that all client data is secure on an ongoing basis. We also require that our digital banking partners meet these same standards for SOC 2 and PCI compliance, ensuring that our system is safe from top to bottom.

2. Systems Development Life Cycle Controls

We integrate security standards into every stage of our systems development life cycle (SDLC). From our roadmap and design phase to development and release, we keep security at the forefront. As part of this methodology, we employ a multistage testing protocol for feature requests, bug fixes, style changes, and library updates. We also apply manual and automated code security reviews and validate all code functionality, integration, and secure coding techniques. Finally, we maintain all of these controls while keeping a development speed that consists of many releases to production per day.

3. Security Operations

The security operation team at MX goes the extra mile in protecting our live product offerings. Every product and feature set has specific owners and custodians that are accountable for systems and data. The team also conducts comprehensive security monitoring programs and stands by to remedy potential intrusions or data leaks. 

4. Human Resource Controls

We provide comprehensive training on security awareness to MX personnel. In addition to general security curricula and advanced topics on code and operations security, MX regularly provides hands-on opportunities for employees to test their awareness in social engineering trials. MX conducts full background checks and enforces strong access control management and termination procedures.

5. Risk Analysis

MX validates the effectiveness of its security program annually. We know that security is never a once and done endeavor, and the challenges of providing proven security controls with sufficient rigor is demanding. Fortunately, we have a security-minded culture that starts with the newest employee and culminates with insightful C-level officers who understand the critical need for information security.

We also employ third-party consulting, internal testing, and a comprehensive risk analysis process to identify and ameliorate gaps resulting from changes in the security landscape or the MX security posture. MX maintains and regularly tests its risk management, disaster recovery, and business continuity plans.

6. Physical Security

Because we store and process all client data in a Tier-3 certified data center on MX-owned hardware, we take physical security seriously. Photo ID badges must be worn at all times by all employees and visitors, and the number of visitors is tightly controlled. All systems and data housed at collocations are protected by CCTV, biometric access controls, and dedicated cages. 

Conclusion

If you’re a prospective client who would like more information about our security procedures, we will provide additional details about these and other aspects of our program. For more information about security at MX, please contact your account representative or send an inquiry directly to security@MX.com.

Jon Ogden

Written by Jon Ogden

Jon Ogden is the Director of Content Marketing at MX.

New Call-to-action
New Call-to-action