Our Security Measures

Whether you invest in our inbound or outbound solutions, every industry we serve gets robust security measures

Our Robust Systems and Secure Operations

ListenTrust is not just PCI compliant. We’re 100% PCI certified and third-party audited on an annual basis to ensure we’re providing the highest level security possible for our clients and their customers. We combine this with a highly reliable and redundant infrastructure and support system, including the following:

24/7 Support and Monitoring

At ListenTrust, we provide 24/7 support and monitoring of all systems and data-related infrastructure. We have two firewalls configured on High Availability in Active/Passive mode. One firewall is a standby that becomes active when the primary firewall fails. Our internet services are configured on SD-WAN for redundancy in case of primary ISP failure.

Support Icon

100% PCI DSS 3.0 Certified

As a PCI certified company, we secure all financial transactions originating at the site. ListenTrust acts as a Credit Card processor only (since Credit Card information is not stored by ListenTrust).

99% Uptime

We have a 99% uptime on the internal and external infrastructure.

2 DS3 (60 Mbit) High-Speed Data Links

We have 2 DS3 (60 Mbit) high-speed data links available with redundant connection to the Internet backbone

Internal Network Infrastructure

Our internal network infrastructure is equipped with Category 6 high speed specifications and redundant links.

Full-Time, Dedicated IT Personnel

We perform background checks on all your new hires. Our new hires are also trained and certified on our Information Security Policies (PCI) and Security Awareness programs before they access the Operations area. We also retrain and recertify our personnel annually.

Information Security and Data Integrity

Access to any of the network components or server is secured with a two-factor authentication security layer. In addition, a network monitoring system is in place to alert about any possible issue from our systems.

IT Project Management

We use a detailed management process from start to delivery of our solutions.

Discover the Difference of Working With a Company You Can Trust

Don’t settle for anything less when it comes to protecting your sensitive information. Contact us today to learn more about how we use our security protocols to protect our customers.
Connect With Us

Security Measures You Can Trust

Our robust systems and secure operations are designed to give you peace of mind. Our infrastructure and support system are highly reliable and redundant, with 24/7 monitoring and support for all systems and data-related infrastructure. We leave no room for vulnerabilities. With ListenTrust, you can rest assured that your sensitive data is handled with the utmost care and attention. Trust is the foundation of our business, and we take it seriously.

Security