Security at Peach
Peach’s technology and information security program is designed to exceed industry standards. We use a variety of controls to ensure the information of our lenders and borrowers stays secure, and we’re committed to an API-first approach when we design and develop features.
Modern cloud technology
Peach is hosted in a virtual private cloud (VPC) within Google Cloud Platform (GCP). By using modern HA cloud architecture, we’re able to leverage years of security enhancements to better protect against security incidents.
Built on APIs
Peach’s modern, well-documented RESTful APIs are easy to integrate with any loan origination system (LOS). We’re also consumers of our own platform, utilizing an identical set of APIs.
We use multi-factor authentication (MFA) as an additional layer of authentication beyond usernames and passwords for all critical internal systems. This helps prevent unauthorized users from gaining access to our clients’ data.
Personally identifiable information (PII), bank accounts and card details are encrypted using 256-bit AES-GCM lender-specific rotating keys for maximum security.
Audit and accountability
We provide a full audit trail of all communications, money movement, accounting and financial decisions.
We provide an out-of-the-box solution for payments via ACH, debits cards and checks.
We use reports, velocity checks and alerts to track anomalies and quickly respond and resolve adverse events.
Peach seamlessly integrates with your SSO system of choice.
We provide robust role-based access control to serve the needs of any lender.
Built for security and compliance
Peach Finance is SOC 2 Type 2, SOC 1 Type 1, HIPAA and PCI DSS Level 1 compliant. We practice defense-in-depth security architecture and employ best-in-class practices and tools to maintain security on all levels.