Security at Peach
Peach’s technology and information security program is designed to exceed industry standards. We use a variety of controls to ensure that lender and borrower information stays secure, and we’re committed to an API-first approach to designing and developing features.
Modern cloud technology
Peach is hosted in a virtual private cloud (VPC) within Google Cloud Platform (GCP). By using modern HA cloud architecture, we’re able to leverage years of security enhancements to better protect against security incidents.
Built on APIs
Peach’s modern, well-documented RESTful APIs are easy to integrate with any loan origination system (LOS). We’re also consumers of our own platform, utilizing an identical set of APIs.
Strong authentication
We use multi-factor authentication (MFA) as an additional layer of authentication beyond usernames and passwords for all critical internal systems. This helps prevent unauthorized users from gaining access to our clients’ data.
Data encryption
Personally identifiable information (PII), bank accounts and card details are encrypted using 256-bit AES-GCM lender-specific rotating keys for maximum security.
Audit and accountability
We provide a full audit trail of all communications, money movement, accounting and financial decisions.
Secure payments
We provide an out-of-the-box solution for payments via ACH, debits cards and checks.
Robust monitoring
We use reports, velocity checks and alerts to track anomalies and quickly respond and resolve adverse events.
Seamless integration
Peach seamlessly integrates with your SSO system of choice.
Access control
We provide robust role-based access control to serve the needs of any lender.
Built for security and compliance
Our loan management and loan servicing software is compliant with SOC 1 Type 1, SOC 1 Type 2, SOC 2 Type 2, PCI DSS Level 1 and HIPAA. We practice defense-in-depth security architecture and employ best-in-class practices and tools to maintain security on all levels.
Peach’s Trust Portal
Our Trust Portal offers self-service access to the certifications, reports, policies and documents that substantiate our commitment to data privacy, app security and network safety.