When you’re looking for a payment provider, it’s important to know what to look for and what questions to ask. A trusted provider with proven security protocols that can also demonstrate compliance with international financial and banking regulations can help give you peace of mind.
When partnering with Payoneer, you are guaranteed that all of your disbursements are made through a fully compliant, secure and tightly audited payments platform that is recognized and valued by financial regulators all around the world.
![Payment Security eCommerce]()
The Payoneer platform features multiple layers of information security and risk technologies that keep you protected against fraud and breach attempts, including registration fraud and account takeover. (Read our blog post, “Securing Your Payoneer Account” for more details.)
Third party tools are implemented at various layers of our platform, including 41stParameter, RSA Adaptive Authentication, MaxMind, AU10TIX, InRule, IDChecker, G2 Web Services and IBM content analytics. This technology, our operations and our years of experience have proven invaluable in preventing all kinds of cyberattacks targeting the organizations that use Payoneer, their sellers and buyers.
Password Security — Payoneer users set up their own passwords, which are encrypted and inaccessible to anyone inside Payoneer. All personal data, as well as each transaction, is protected by strong encryption that makes data unreadable. Any information we receive is protected within our network by secured firewalls.
Fraud and Scam Prevention — Every transaction is heavily guarded behind our firewalls and sophisticated anti-hacking techniques. We monitor all transactions to prevent fraud, identity theft, phishing encounters and other attacks. Once a probable attack is identified, our dedicated teams of security specialists investigate the source and take precautions to protect your account, as well as those of other account holders.
Virtual and Physical Protection — We back up all your data, all the time. Plus, we protect the physical security and integrity of all data. We are constantly updating our protocols to prevent losses to our facilities through fire, physical theft and accidents. Every access point, either hardware or software related, is protected by secured firewalls and virus detection systems which eliminate tampering and hacking. We apply software patches regularly to close any potential breaches in security, and our systems undergo a mandatory annual and comprehensive PCI audit.