Security is our top priority
Plooto keeps your information and payments safe
We meet and exceed national security standards and deliver exceptional financial and data security. Our continuous improvements as well as close partnership with leading technology and payment providers demonstrates our commitment to world-class security.
Trusted Payment Network Technology
Processed payments are settled through our partnership with members of the Automated Clearing House (ACH). Our payment technology is built on top of the existing banking infrastructure, which is developed and maintained by NACHA.
Secure Cloud Platform Infrastructure
Plooto’s infrastructure is hosted by Microsoft Azure through its Infrastructure as a Service (IaaS) business unit. Microsoft delivers cloud services to many of the world’s leading enterprises and government agencies.
Cutting Edge Data Encryption Technology
All communication between users and Plooto is encrypted using the latest Secure Hash Algorithm 2 (SHA2) SSL Certificates. This standard is utilized by top financial institutions and ensures no data is intercepted by unauthorized parties.
How Plooto works
Plooto works with existing banking infrastructure. When a transaction is submitted, Plooto sends the instructions to the banks to have them transfer the funds between two accounts.
Bank account Validation
Transactions submitted by Plooto to a bank are validated using sophisticated algorithms. With Plooto, we use the Modulus 10 routine, which is also used by financial institutions and government agencies.