Secure loan origination software
When using our Software as a Service, (SaaS), only you have access to your applicants' sensitive information. We combine innovative technology with practical planning to defend against security threats to private information. Our approach safeguards data retrieval as well as application hosting and data storage. In order to provide our clients with secure access to their loan origination, we have built a system with features that go far beyond password protection.
Multiple credentials are required to gain access to our loan origination software. Simply having a user-ID or a user-ID and password is not sufficient. In addition, we require our customers to maintain an active client ID management process. This provides us with another level of identification so that only authorized customers gain access to our loan origination software.
IP address restrictions
Clients have the option to register the IP addresses of all computers that will be used to access our loan origination software and background check system. This precaution provides yet another layer of client identification. Unauthorized IP addresses are not able to access our system.
Client-specific (optional) time of day restrictions give access to our system during authorized hours only. Time restrictions help avoid after-hours attempts at intrusion and unauthorized employee access to our loan origination software.
Limit user access by function
We have incorporated restrictions to user access within each of our applications—such as general user, manager, and administrator—to allow you to restrict an individual user's access to specific areas of the software. Each software module exists in total isolation which allows you to define a user's access based upon responsibilities. For example, it is possible to have an administrator for resetting user passwords, but restrict this user from access to consumer confidential information.
Users who remain inactive are automatically disconnected from our loan origination software based on pre-set time intervals set by administrators. This prevents client-site security mishaps, where often, users leave for the day, and someone else could gain access through their terminal.
In addition to using 128-bit SSL for browser communication security, sensitive data and consumer information is stored in an encrypted format within our database
Data storage and application hosting security
Our dedicated servers are housed at Verizon Terremark, a Tier 1 managed hosting provider with industry leading expertise and experience. Verizon Terremark has achieved the SSAE 16 SOC 1 & SOC 2 and SysTrust Certification. Verizon Terremark employs a security team whose charter is to protect the integrity and confidentiality of our infrastructure, applications, and data. Our internal attention to security matters is complemented by Verizon Terremark comprehensive security program, which includes:
Certification by an Industry Leader
TCI uses Verizon Terremark to secure your data, identities, and your customers' confidence—from desktop to device, along your network and around the world.
The Verizon Terremark-managed services team monitors the stability and performance of:
- Environmental issues, including power, temperature and humidity;
- Network connectivity to the Internet (i.e. Front End), and to our Credit Bureaus (i.e. Back End);
- Hardware usage and failure, including CPU utilization, hard drive utilization, memory utilization, and equipment components (e.g. cards, drivers, memory, processors);
- Software functioning, including web servers, application servers and database servers.
Comprehensive physical security
An on-site security staff safeguards the Verizon Terremark hosting facility and all assets housed within.
Safeguards against natural disasters, hardware downtime and power interruptions.
Verizon Terremark servers are connected to two independent power networks including redundant power outlets and power distribution systems (i.e. uninterruptible power supplies, conditioners and distribution units) that are fed by two separate power grids and supplied by separate utility companies.
Digital certificate authentication
Our SSL certificates are guaranteed to be authentic by VeriSign, which provides customers with the confidence that they are interacting with our secure websites.
High availability architecture with mirrored data storage
In the event of an outage, Verizon Terremark provides high N+1 redundancy to minimize downtime. Specific features include redundant load balancers, firewalls, application and database servers with redundant components.
Private connections to all credit bureaus
We have dedicated private connections to all credit bureaus to safeguard the transmission of data. In addition, multiple connections to our credit bureaus via separate carriers increase connectivity.
Click here to email a request for a copy of our security policy.
See how our decision lending software solution can help your business. Read about DecisionLender and contact TCI for a free demo. Email or call us at (800) 841-9950.