Skip to main content
All CollectionsFAQ
Quickly Security Overview
Quickly Security Overview

How Quickly Keeps Your Data Secure

Maria Bracho avatar
Written by Maria Bracho
Updated over a month ago

At Quickly, security is our top priority. We are committed to protecting your sensitive business information and ensuring that your data is handled securely and in compliance with industry standards. Here’s a summary of how we protect your data:

Our Commitment to Security

We implement stringent security controls across all aspects of our technology, including:

  • Software Development
    All our software is built in-house by a dedicated team of engineers, allowing us to maintain high-security standards from development to deployment.

  • Internal and Web-Application Networks
    We have robust network controls in place to protect the confidentiality and integrity of your data.

  • Data Management
    Quickly ensures your data remains secure, compliant, and inaccessible to unauthorized parties at all times.


How We Protect Your Data

We take several measures to ensure your payment and business data is secure:

  • Daily Backups
    Databases are automatically backed up hourly and retained daily across multiple zones, protecting you from data loss, corruption, or theft. These backups are tested semi-annually to ensure they can be restored when needed.

  • Data Storage
    Business data is logically separated from other businesses, ensuring that no one else has access to your data. Any access by authorized Quickly staff is logged for added security.

  • Encryption
    All sensitive business information, including bank accounts and credit card numbers, is encrypted using AES-256-GCM. We do not store CVV, PIN, EMV, or mag stripe data, further protecting your financial details.

  • Data in Transit
    We secure your data while it's in transit using TLSv1.2 and strong encryption protocols. Outdated protocols (SSLv3, TLSv1.0, TLSv1.1) are excluded to ensure your information’s integrity and confidentiality.

etwork Security

Quickly operates in a closed, Virtual Private Network (VPN) environment to ensure that access to our systems is secure and isolated.

  • Firewalls and IDS/IPS
    Our platform is protected by firewalls and Intrusion Detection and Prevention Systems (IDS/IPS). These systems monitor network traffic for abnormalities or malicious activity. If suspicious behavior is detected, our systems respond immediately to protect your data and alert our security team.

  • Regular System Updates
    Our servers and network appliances are regularly updated. Critical patches are applied immediately to address any newly discovered vulnerabilities.

Service Uptime and Reliability

Quickly strives for maximum uptime, ensuring that our systems remain available to you at all times. We use redundant virtual environments and industry-best practices to deliver high availability and resilience.

Authentication and Access Control

To protect access to Quickly’s systems, we enforce strict authentication and access control protocols:

  • VPN Requirements
    All internal access to Quickly’s systems must go through a secure, VPN-encrypted connection.

  • Multi-Factor Authentication (MFA)
    We require MFA for access to sensitive systems, adding an extra layer of security to user logins.

  • Defined User Roles
    Role-based access controls ensure that only authorized personnel have access to specific data and systems.

  • Comprehensive Logging
    All access and activity within our networks are logged, giving us a clear trail of actions and allowing us to investigate any suspicious activity.

Did this answer your question?