Transax, Inc Security

At Transax, security is our absolute highest priority. In the spirit of openness and transparency, here are some of the security measures we take to protect and defend the Transax platform.

We protect your data

All data is written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are stored on servers that use modern techniques to remove bottlenecks and points of failure.

Your users’ data never leaves our servers

We distinguish between data about your users and data about you, yourself. While, for example, your billing information is shared with Stripe, and your profile is accessible to us in our help desk software, any data about you or your users are never shared with any external providers without explicit consent and only on an as needed and as approved basis, and never leaves our server cluster hosted with Amazon Platform.

Encrypting data in transit

Whenever your data is in transit between you (or your users) and us, everything is encrypted, and sent using HTTPS.

During a user agent’s (typically a web browser) first site visit, Transax sends a Strict Transport Security Header (HSTS) to the user agent that ensures that all future requests should be made via HTTPS even if a link to Transax is specified as HTTP. Additionally, we use HSTS preload, guaranteeing that requests are never – not even the very first – made over a non-encrypted connection. Cookies are also set with a secure flag.

Encrypting data at rest

Any files or information uploaded or sent to us are stored and are encrypted at rest.

Our backups of your data are likewise encrypted.

Hosted on Amazon Platform

Transax is hosted on AWS. Our database is managed by Amazon, ensuring redundancy, high availability and trustworthy automated, encrypted backups.

AWS is certified for a growing number of compliance standards and controls, and undergoes several independent third party audits to test for data safety, privacy, and security. 

Concurrency and rate limiting

We employ several layers to protect against abuse and DoS attacks, such as concurrency limiting (limits number of active requests) and rate limiting (limits number of requests over time). Our servers gracefully queue requests when under high load, and handles them at a safe pace.

Organizational practices

Development practices

Penetration testing

On top of our development-related continuous testing, we also conduct periodic third-party manual penetration testing of both our application and infrastructure. You can request a copy of our latest report at

Regularly-updated infrastructure

Our software infrastructure is updated regularly with the latest security patches. Our products run on a dedicated network which is locked down with firewalls and carefully monitored. While perfect security is a moving target, we work with security researchers to keep up with the state-of-the-art in web security.

We protect your billing information

All credit card transactions are processed via Stripe using secure encryption—the same level of encryption used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network.

Have a concern? Need to report an incident?

Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Send urgent or sensitive reports directly to We’ll get back to you as soon as we can, usually within 24 hours. Please follow up if you don’t hear back. For requests that aren’t urgent or sensitive: submit a support request.

Keeping customer data safe and secure is a huge responsibility and a top priority. We work hard to protect our customers from the latest threats. Your input and feedback on our security is always appreciated.

Additional policies