<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=966776200123768&amp;ev=PageView&amp;noscript=1">

Security is our top priority

Plooto keeps your information and payments safe

We meet and exceed national security standards and deliver exceptional financial and data security. Our continuous improvements as well as close partnership with leading technology and payment providers demonstrates our commitment to world-class security.

feature-security-3.png

Three-tier architecture

1

Trusted Payment Network Technology

Processed payments are settled through our partnership with members of the Automated Clearing House (ACH). Our payment technology is built on top of the existing banking infrastructure, which is developed and maintained by NACHA.

2

Secure Cloud Platform Infrastructure

Plooto’s infrastructure is hosted by Microsoft Azure through its Infrastructure as a Service (IaaS) business unit. Microsoft delivers cloud services to many of the world’s leading enterprises and government agencies.

3

Cutting Edge Data Encryption Technology

All communication between users and Plooto is encrypted using the latest Secure Hash Algorithm 2 (SHA2) SSL Certificates. This standard is utilized by top financial institutions and ensures no data is intercepted by unauthorized parties.

How Plooto works

Plooto works with existing banking infrastructure. When a transaction is submitted, Plooto sends the instructions to the banks to have them transfer the funds between two accounts.

Screen_Shot_2016-06-09_at_5.46.08_PM.png

Bank account Validation

Transactions submitted by Plooto to a bank are validated using sophisticated algorithms. With Plooto, we use the Modulus 10 routine, which is also used by financial institutions and government agencies.

Bank_Accounts_Laptop.png