Security and Reliability Safeguards

At Bectran we know that our customers rely on us as an important part of their business processes and record keeping. We take our responsibilities to our customers seriously, and the security and reliability of the software, systems and data that make up the Bectran application are our top priority.

Security

Security

All information traveling between your browser and Bectran is protected from eavesdroppers with 256-bit SSL encryption. The lock icon in your browser lets you verify that you aren't talking to a phishing site impersonating Bectran and that your data is secure in transit.

Reliability

Reliability

The Bectran infrastructure uses redundant storage and servers to keep the application and your data available in the case of hardware failure – and another set of servers and storage in a geographically separate data center in case our primary data center is made unavailable by a disaster or other disruption.

Physical Security

Physical Security

The Bectran servers are located in state-of-the-art datacenters, which provide biometric access controls, constant surveillance, redundant power feeds and generators, robust fire suppression, and carefully monitored climate control to protect the servers that store your data and manage your billing.

Managed Hosting

Managed Hosting

The Bectran platform utilizes world-class data centers for hosting requirements. With a vast array of clients with varying needs, Bectran's data centers provide an environment that allows for the fast delivery of features, continued product innovation, reliable security and stability and a reduced chance of downtime.

Firewall

Firewall

The Bectran application, including your data, rest securely behind firewalls.

Strong Encryption

Strong Encryption

Bectran uses industry standard encryption protocols and practices to responsibly store and transmit sensitive information (including cardholder data).

Secure Development Practices

Secure Development Practices

Bectran developers follow the secure development practices described in OWASP. Furthermore, we subscribe and adhere to the principals of least access.

Breach Notification

Breach Notification

If there is a security and/or privacy breach that occurs, we will notify the necessary authorities and impacted customers within the legally required timelines based on the Applicable Data Protection Law.

Backups

Backups

The data in your Bectran account is replicated across multiple database servers in two geographic locations to prevent a single failure from causing data loss. Additionally, that data is backed up nightly to tape and stored in a secure offsite location to ensure that, even in the event of a catastrophe like a tornado or flood, your information will be safe and your records can be quickly restored.

sec-aicpa

Independently Audited

AICPA

SOC2 Type 2

Bectran undergoes this industry-standard security audit on an annual basis, having passed without exception since 2016. We are verified at the highest level—not only for our data centers and agents, but also for our own internal security policies, processes, and employees.