Product Security Practices
New features, functionality,
and design changes go through a functionality review process. In
addition, our code is audited with automated static analysis software,
tested, and manually peer-reviewed prior to being deployed to
We work in three physically separated environments Development, Pre-Production and production being this last one completely isolated from the other ones and the only one with impact to our clients.
The security team works closely with development teams to resolve any additional security concerns that may arise during development.
Any deployment in the production environment should follow our change management rules, including deployment approvals and a rollback process.