• menu-solution-icn Connect
  • Italiano
  • Español
  • English(UK)
  • logo
  • img
    img

    Meeting Internal Audit Policies

    Kyriba offers structured and auditable workflows so that finance teams can comply with audit and control policies for cash management, payments, bank accounts and other separation of duties and data loss prevention.

    img
    img

    Regulatory Compliance

    Kyriba supports our clients in their compliance with regulations that affect corporate finance, such as Sarbanes-Oxley, FBAR, hedge accounting and OFAC to bring peace of mind to the organization.

    Information transparency, processing, reporting and documented controls simplify compliance actions.

    rm-banner-shape

    Safety in the Cloud

    IT can attest that financial data is safer in the cloud, but not all “clouds” are alike when it comes to information security. Kyriba has invested in its technology to ensure that the right regulations are met for data security, operational controls and disaster recovery.

    • img

      Application Security

      Kyriba’s application security ensures the “front door” of your treasury system is safe with strong password policy controls, multi-factor authentication, IP filtering, single sign-on and data encryption at rest and in motion.

    • img

      Physical Security

      It is imperative that cloud platforms protect data from internal and external attacks. Kyriba’s physical security infrastructure includes a cyber defense center with SIEM, a network operations center and world class data centers with 24-hour security, biometric scanning, digital video surveillance, gated entrance and secure data racks.

    • img

      Vendor Security

      Kyriba invests in security processes including web server security, penetration testing, email security, database security, networking, vulnerability management and secure coding.

    • img

      Ongoing Process Security

      Our risk governance program ensures we are in line with security policies, procedures, audits and attestation thanks to continuous monitoring, event logging, security awareness training, segregation of duties and third-party audits.

    img
    Activate Liquidity.

    Transform how you use liquidity as a dynamic vehicle for growth and value creation

    Find out how