assurance.wexinc.com
Open in
urlscan Pro
34.36.127.37
Public Scan
URL:
https://assurance.wexinc.com/
Submission: On May 14 via api from US — Scanned from DE
Submission: On May 14 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
You need to enable JavaScript to run this app. OVERVIEW At WEX, we prioritize the security of our customer's data. We have robust, multifaceted programs in place based on industry-recognized standards to ensure that our services are secure, resilient and compliant. This Assurance Profile enables us to proactively and transparently share information about our posture, practices and controls. We continuously monitor our programs to ensure they meet compliance and regulatory requirements. WEX provides multiple services and product offerings. Compliance certifications vary across our services and products, please inquire for additional details on product specific compliance. Additionally, WEX holds financial services licenses in several different jurisdictions. For more information, please refer to our WEX Group Regulated Entities Overview. COMPLIANCE AND CERTIFICATIONS SOC HITRUST PCI-compliant Keyword search GLOBAL RESILIENCE Operational Resilience Technology Resilience Crisis Management See more ⟶ HUMAN RESOURCE SECURITY Employee Training HR Security See more ⟶ APPLICATION SECURITY Software Development Lifecycle (SDLC) Code Analysis Penetration Testing Web Application Firewall (WAF) See more ⟶ THREAT, VULNERABILITY AND EVENT MANAGEMENT Threat Detection Incident Response Intrusion Detection/Prevention (IDS/IPS) Vulnerability Management See more ⟶ NETWORK SECURITY Logging Infrastructure Email Security Wireless Security See more ⟶ ACCESS CONTROL Data Access Privileged Access Password Controls Multi-Factor Authentication (MFA) See more ⟶ PHYSICAL SECURITY Site Control Measures Detection and Response Data Center Security See more ⟶ INFORMATION SECURITY Information Security Security Posture See more ⟶ PRIVACY Data Subject/Consumer Requests Policies and Procedures Risk Assessments Cookies See more ⟶ THIRD PARTY RISK MANAGEMENT (TPRM) Third-Party Risk Management (TPRM) Vendor Monitoring Practices See more ⟶ DATA SECURITY Encryption Standards Asset Management Data Disposal See more ⟶ SELF- ASSESSMENTS Standard Information Gathering Assessment (SIG) Consensus Assessments Initiative Questionnaire (CAIQ) See more ⟶ Managed by