assurance.wexinc.com Open in urlscan Pro
34.36.127.37  Public Scan

URL: https://assurance.wexinc.com/
Submission: On May 14 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

You need to enable JavaScript to run this app.


OVERVIEW

At WEX, we prioritize the security of our customer's data. We have robust,
multifaceted programs in place based on industry-recognized standards to ensure
that our services are secure, resilient and compliant. This Assurance Profile
enables us to proactively and transparently share information about our posture,
practices and controls. We continuously monitor our programs to ensure they meet
compliance and regulatory requirements.


WEX provides multiple services and product offerings. Compliance certifications
vary across our services and products, please inquire for additional details on
product specific compliance. Additionally, WEX holds financial services licenses
in several different jurisdictions. For more information, please refer to our
WEX Group Regulated Entities Overview.


COMPLIANCE AND CERTIFICATIONS


SOC
HITRUST
PCI-compliant
Keyword search


GLOBAL RESILIENCE

Operational Resilience


Technology Resilience


Crisis Management


See more ⟶


HUMAN RESOURCE SECURITY

Employee Training


HR Security


See more ⟶


APPLICATION SECURITY

Software Development Lifecycle (SDLC)


Code Analysis


Penetration Testing


Web Application Firewall (WAF)


See more ⟶


THREAT, VULNERABILITY AND EVENT MANAGEMENT

Threat Detection


Incident Response


Intrusion Detection/Prevention (IDS/IPS)


Vulnerability Management


See more ⟶


NETWORK SECURITY

Logging


Infrastructure


Email Security


Wireless Security


See more ⟶


ACCESS CONTROL

Data Access


Privileged Access


Password Controls


Multi-Factor Authentication (MFA)


See more ⟶


PHYSICAL SECURITY

Site Control Measures


Detection and Response


Data Center Security


See more ⟶


INFORMATION SECURITY

Information Security


Security Posture


See more ⟶


PRIVACY

Data Subject/Consumer Requests


Policies and Procedures


Risk Assessments


Cookies


See more ⟶


THIRD PARTY RISK MANAGEMENT (TPRM)

Third-Party Risk Management (TPRM)


Vendor Monitoring Practices


See more ⟶


DATA SECURITY

Encryption Standards


Asset Management


Data Disposal


See more ⟶


SELF- ASSESSMENTS

Standard Information Gathering Assessment (SIG)


Consensus Assessments Initiative Questionnaire (CAIQ)


See more ⟶
Managed by