
Proven Technology
Platform &
Security Controls


Safeguarding your data and customer information is fundamental to our relationship.
The combination of our platform architecture, our secure controls, and our stringent processes provide our partners with the confidence that the information they provide to us is well protected and secure.
Partnerships Built
on Trust

Architecture
The EZShield Total Protection Platform is a cloud-based platform built to securely deliver the full suite of EZShield fraud and identity theft solutions to your customers and to support the transfer of data.
Flexible
Our configurable platform delivers solutions that meet your specific customer needs. Plug-and play integration capabilities, customizable portal options and multi-platform support including mobile are just a few of the features that can be configured to meet your requirements.
Reliable & Scalable
An extensible Service Oriented Architecture (SOA) and data processing engine get your fraud services up and running fast with high availability, redundancy and fail-over capabilities. We follow agile development and rapid deployment processes. Our platform can be horizontally scaled to support your growing customer base.
Safe & Secure
We’ve done business in highly regulated industries since our company’s inception. Our data management and communication systems meet the most stringent requirements. Applications and data are hosted in SSAE16 certified data centers and data is secured with Triple Layer Defense SystemSM encryption.
EZShield does not sell or trade personal or business information for any reason.

Security Controls
We surpass industry requirements, ensuring the highest level of security coverage for our processes and systems. This includes training and certifications from leading compliance experts. Additionally, we adhere to our internal guideline of maintaining “defense in depth and layers.” EZShield remains committed to improving risk, security, privacy and business continuity through its membership in Shared Assessments.
Adopted Security Best Practices
Cobit 4.1
Information technology risk managementISO 27002
Information security guidelines and best practicesOWASP
Secure development best practices
Routinely-Certified Compliance Standards
PCI Level 1
Certified PCI Level 1 service providerShared Assessments
Certified Shared Assessments AUP CompliantSAS70 Type II/SSAE16
Use of secure data centers and vendors
Certified by 3rd-party Scanners & Auditors
McAffee SECURE ™
Daily scans of websites to pass security testsTrustwave
Monthly scans of websites to verify PCI complianceControl Case
3rd-party auditing and verification
Adopted Security |
Routinely-Certified |
Certified by 3rd-party |
---|---|---|
![]() |
![]() |
![]() |
Cobit 4.1 |
PCI Level 1 |
McAffee SECURE TM |
![]() |
![]() |
![]() |
ISO 27002 |
Shared Assessments |
Trustwave |
![]() |
![]() |
![]() |
OWASP |
SAS70 Type II/SSAE16 |
Control Case |

Skyhigh Networks performs objective and thorough evaluations of the enterprise-readiness of cloud service based on a detailed set of criteria developed in conjunction with the Cloud Security Alliance (CSA). Services designated as Skyhigh Enterprise-Ready are the services receiving the highest CloudTrust™ Ratings, which fully satisfy the most stringent requirements for data protection, identity verification, service security, business practices, and legal protection.

Processes
We follow strict security measures and have documented processes in place to protect against the loss, misuse and alteration of the information under our control. Our processes are periodically updated to meet industry best practices and to exceed legal and regulatory compliance. Highlights of our processes include:
Agile Development Program
Allows EZShield to be aware of emerging security threats and promptly implement the necessary corrective actions.
Access Control and Log Auditing
Ensures control, recording and monitoring of access to data on our systems.
Change Management Process (CMP)
Formal process to verify that changes to our product or system are introduced in a controlled manner.