TurnKey Lender

TURNKEY LENDER INFORMATION SECURITY

TurnKey Lender is committed to protecting our clients and their data. The company’s information security policy exceeds regulatory requirements for data security going above industry standards and best practices. TurnKey Lender has SOC2 Type II compliance reports and the globally-recognized ISO 27001 Certification.

img_TurnKey-Lender_Integrations

TURNKEY LENDER SECURITY FEATURES

img_Turnkey-Lender_turnkey-lender_icons_community-access

Permission-based access

.
Flexible user permissions management allows you to grant users access rights only to the workplaces and data they need in their day-to-day work.
img_Turnkey-Lender_turnkey-lender_icon_menu_apiintegrations

API Clients

.
API Clients functionality allows integrating with third-party products and services using unique secret keys for each case.
img_Turnkey-Lender_turnkey-lender_icons_adjustable-password

Adjustable password strength

.
Adjustable password strength based on your requirements and the local regulations.
img_Turnkey-Lender_turnkey-lender_icons_exclusive-content

Two-factor authentication

.
Two-factor authentication for borrowers and staff.
img_Turnkey-Lender_turnkey-lender_icons_Web-application

Web application security

.
The web application is protected against XSS, scripts, SQL injections, and other common cyberattack types.
img_Turnkey-Lender_turnkey-lender_icons_HTTPS

HTTPS protocol

.
Sensitive information is only sent to the servers via the HTTPS protocol as per the best practices accepted on the web.
img_Turnkey-Lender_turnkey-lender_icons_server-side

Server-side processing

.
Sensitive information is processed on the server-side only.
img_Turnkey-Lender_turnkey-lender_icons_password-encryption

Password encryption

.
All passwords are encrypted and then stored in the database as “Salted Hash” (cryptographic security measure).
img_Turnkey-Lender_turnkey-lender_icons_temporary-userlockout

Temporary user lockout

.
The System supports temporary user lockout. It takes place after multiple failed authentication attempts.
img_Turnkey-Lender_turnkey-lender_icons_anti-ddos

Anti-DDos protection

.
TurnKey Lender security is enhanced with anti-DDoS throttling protection.
img_Turnkey-Lender_turnkey-lender_icons_fraud-prevention

Fraud prevention rules

.
A wide array of fraud-prevention rules built-in.
img_Turnkey-Lender_turnkey-lender_icons_activity-monitoring

Activity monitoring

.
Streamlined activity monitoring and audit trail capabilities allow to always reliable documentation of all actions taken by users.

CERTIFIED AND COMPLIANT

img_Turnkey-Lender_soc2

SOC 1 Type I

img_turnkey-lender_

SOC 2 Type II

ISO/IEC 27001:2022 and risk management

img_Turnkey-Lender_iso_iec27002_v2

ISO/IEC 27002:2022 clauses and controls

img_Turnkey-Lender_iso_iec27015

ISO/IEC 27017:2015

img_Turnkey-Lender_iso_iec27018_v2

ISO/IEC 27018:2019

img_Turnkey-Lender_gdpr2016_v2

GDPR 2016

img_Turnkey-Lender_nist

NIST

img_Turnkey-Lender_owasp

OWASP

img_Turnkey-Lender_imda-singapore

IMDA Singapore

img_Turnkey-Lender_psi-dss

PCI DSS

TURNKEY LENDER INFORMATION SECURITY POLICY

Below you can find and download TurnKey Lender’s Information Security Policy. We use it to ensure the protection of information from unauthorized access, loss, or damage while supporting open information-sharing and storing the needs of our clients. The TurnKey Lender ISP includes:
img_Turnkey-Lender_img_Turnkey-Lender_

Information Security Objectives

img_Turnkey-Lender_img_Turnkey-Lender_

Overview of Information Security at TurnKey Lender

img_Turnkey-Lender_img_Turnkey-Lender_

Hardware and Software Environment Security Policy

img_Turnkey-Lender_img_Turnkey-Lender_

Human Resources Security Policy

img_Turnkey-Lender_img_Turnkey-Lender_

Information Security Incident Management

img_Turnkey-Lender_img_Turnkey-Lender_

Information Security Certificates

Platform   

Flexible loan application flow

Automated payments and loan servicing

Efficient strategies for all collection phases

AI-based consumer and commercial credit scoring

Use third-party data and tools you love.

Consumer lending automation done right

Build a B2B lending process that works for you

Offer payment options to clients in-house

Lending automation software banks can rely on

TURNKEY COMMERCIAL BROCHURE

Thank you! Get in touch with any questions at [email protected]