Security & Compliance

Enterprise-grade security features for financial message management.

Role-Based Access Control

Comprehensive role-based user access control with multiple authentication methods: LDAP, RADIUS, or database. Primary and secondary authentication with automatic failover. Configurable password policies including complexity requirements, history validation, and account lockout after failed attempts.

4-Eyes Principle

Built-in support for verification and authorization workflows for business messages. Administrative operations (user management, role management, profile management) can also require maker-checker approval. Pending operations tracked in Inbox with detailed change comparison (old vs. new values highlighted). Entity locking during approval prevents conflicts. Rejection with reason tracking. Complete audit trail of approval workflow for both business and administrative operations.

Data Segregation

User profiles enable data segregation for fine-grained protection. Different departments or entities can be isolated within the same platform instance. Organizational units group users for message creation and approval control. Unit-based approval restrictions ensure only authorized personnel can approve messages from specific departments. Template segregation by unit. Profile restrictions filter by BIC patterns, message types with wildcards, or amount ranges with currency conversion.

Audit Logging & Compliance

Comprehensive audit trail preserving session information, audit records, and detailed message processing traces. Configurable retention policies (default 365 days for audit logs, 30 days for workflow traces). Automated log purging with configurable schedules reduces operational overhead while maintaining compliance.

Session Tracking

Complete session management with configurable automatic timeout (15 minutes default). Multi-device concurrent sessions with per-browser isolation. Detailed login history tracking captures all successful and failed login attempts with timestamps and IP addresses. Prevents unauthorized access from unattended workstations while supporting operational flexibility.

Multi-Layer Encryption

Defense-in-depth encryption strategy: TLS/SSL for application HTTPS (user and REST API access), MQ endpoint SSL encryption (1-way and 2-way authentication) and secure database connections. LAU (Local Authentication) digital signing for SWIFT Alliance Access ensures message integrity and non-repudiation. LAU keys stored encrypted in database.

Password Security Controls

Configurable password complexity (length, uppercase, lowercase, digits, special characters). Password history validation prevents reuse. Automatic account lockout after failed login attempts. Role-based expiration policies allow stricter rotation for privileged accounts. Passwords hashed (never stored in plain text) protect against database breaches. Meets PCI-DSS, SOC 2, and banking security requirements.

REST API Security

JWT token-based authentication for REST API reduces credential exposure over network. Token-based approach enables secure system-to-system integration with stateless authentication. Role-based access control extends to REST API resources with same granular permissions as UI. Prevents API abuse while enabling back-office integration.

Content Security Policy

CSP headers prevent XSS and code injection attacks. Configurable frame-ancestors control iframe embedding. Defense-in-depth security approach following modern web application security standards.

BIC & Reference Data Management

Built-in BIC, currency, and country code directories. Import SWIFT official updates automatically. Optional BIC validation for quality control. Currency rate conversion support for amount-based routing rules.

On-Premises Control

Why banks choose Prowide Messaging Hub for data sovereignty and independence

Your infrastructure, your data sovereignty

Network-agnostic (SWIFT and proprietary networks)

Faster deployment than typical enterprise solutions

Perpetual licensing (own the software, not subscription-based)

Fully customizable to your workflows

Get it

Give it a try


Looking for pricing information? Want to try a demo?
Contact us indicating your company type and use case.

Contact us