close

What Do You Want to Do?

View my online fraud and identity theft protection account

Access my Online Dashboard

Take advantage of the fraud protection I have with my checks

Go to my Check Fraud Protection

Get the latest Fraud and Breach News to protect myself

Visit Fighting Identity Crimes

We are here when you need us!

Call us at 1-888-439-7443

Dynamic H-Nav

Horizontal Nav for Blog Pages

Secure Partner Platform

tertiary H-Nav

Proven Technology
Platform &
Security Controls

proven technology platform proven technology platform

Safeguarding your data and customer information is fundamental to our relationship.

The combination of our platform architecture, our secure controls, and our stringent processes provide our partners with the confidence that the information they provide to us is well protected and secure.

Get the details about our
Secure Partner Platform

Download Now

Partnerships Built
on Trust

Architecture

Architecture

The EZShield Total Protection Platform is a cloud-based platform built to securely deliver the full suite of EZShield fraud and identity theft solutions to your customers and to support the transfer of data.

Flexible

Our configurable platform delivers solutions that meet your specific customer needs. Plug-and play integration capabilities, customizable portal options and multi-platform support including mobile are just a few of the features that can be configured to meet your requirements.

Reliable & Scalable

An extensible Service Oriented Architecture (SOA) and data processing engine get your fraud services up and running fast with high availability, redundancy and fail-over capabilities. We follow agile development and rapid deployment processes. Our platform can be horizontally scaled to support your growing customer base.

Safe & Secure

We’ve done business in highly regulated industries since our company’s inception. Our data management and communication systems meet the most stringent requirements. Applications and data are hosted in SSAE16 certified data centers and data is secured with Triple Layer Defense SystemSM encryption.

EZShield does not sell or trade personal or business information for any reason.

Architecture

Security Controls

We surpass industry requirements, ensuring the highest level of security coverage for our processes and systems. This includes training and certifications from leading compliance experts. Additionally, we adhere to our internal guideline of maintaining “defense in depth and layers.” EZShield remains committed to improving risk, security, privacy and business continuity through its membership in Shared Assessments.

Adopted Security Best Practices

  • Cobit 4.1

    Information technology risk management
  • ISO 27002

    Information security guidelines and best practices
  • OWASP

    Secure development best practices

Routinely-Certified Compliance Standards

  • PCI Level 1

    Certified PCI Level 1 service provider
  • Shared Assessments

    Certified Shared Assessments AUP Compliant
  • SAS70 Type II/SSAE16

    Use of secure data centers and vendors

Certified by 3rd-party Scanners & Auditors

  • McAffee SECURE ™

    Daily scans of websites to pass security tests
  • Trustwave

    Monthly scans of websites to verify PCI compliance
  • Control Case

    3rd-party auditing and verification

Adopted Security
Best Practices

Routinely-Certified
Compliance Standards

Certified by 3rd-party
Scanners & Auditors

Cobit 4.1
Information technology risk management

PCI Level 1
Certified PCI Level 1 service provider

McAffee SECURE TM
Daily scans of websites to pass security tests

ISO 27002
Information security guidelines and best practices

Shared Assessments
Certified Shared Assessments AUP Compliant

Trustwave
Monthly scans of websites to verify PCI compliance

OWASP
Secure development best practices

SAS70 Type II/SSAE16
Use of secure data centers and vendors

Control Case
3rd-party auditing and verification

Sky High

Skyhigh Networks performs objective and thorough evaluations of the enterprise-readiness of cloud service based on a detailed set of criteria developed in conjunction with the Cloud Security Alliance (CSA). Services designated as Skyhigh Enterprise-Ready are the services receiving the highest CloudTrust™ Ratings, which fully satisfy the most stringent requirements for data protection, identity verification, service security, business practices, and legal protection.

Architecture

Processes

We follow strict security measures and have documented processes in place to protect against the loss, misuse and alteration of the information under our control. Our processes are periodically updated to meet industry best practices and to exceed legal and regulatory compliance. Highlights of our processes include:

Agile Development Program

Allows EZShield to be aware of emerging security threats and promptly implement the necessary corrective actions.

Access Control and Log Auditing

Ensures control, recording and monitoring of access to data on our systems.

Change Management Process (CMP)

Formal process to verify that changes to our product or system are introduced in a controlled manner.

Security Data Sheet Download

Learn more about our innovative & secure technology platform.

Download Now

Sign up for our Fraud Protection Newsletter