Security & Scalability

Your customers are our customers and the protection of their data is of paramount importance

Event Advocate protects your transactions with bank-level security.  We use state of the art Auth2.0 Protocol with Bearer Tokens for authorized access.  Event advocate's platform is configured  to avoid unauthorized access at both the business process and database level. We protect data-in motion using SSL and TLS at the Transport Layer,  and throttle and log all access. We NEVER, EVER, EVER, store any credit card information on our systems and information is stored by a PCI Compliant Gateways 

We NEVER, EVER, EVER, store any credit card information on our systems

We support both Resource Owner and Client Credential Access methodology allowing short and long term bearer tokens preventing unauthorized access to any sensitive data.  

All Private information is stored by a PCI Compliant Gateways

Event Advocate's platform is configured  to avoid unauthorized access at both the business process and database level. We protect data-in motion using SSL and TLS at the Transport Layer,  and throttle and log all access. 

Back