Treasury Software practices the concept of 'Defense in Depth' (also known as Castle Approach), in which multiple layers of security controls (defense) are placed throughout the system.
Encryption - To keep data from getting out
ACH Universal encrypts all account numbers using the most secure symmetrical encryption algorithm available. AES is used by the U.S. and Canadian governments as standards for encrypting data.
Hashing - To protect unauthorized insertions/changes from getting in
Each record is hashed - and the hash is encrypted - to make sure that records remain unchanged and no records are inserted by circumventing the system.
Limit access to only authorized users.
Integrate with Windows Active Directory (Windows Login ID), or create login Id's from within ACH Universal to display challenge screen.
Logs all activity at both the record and file level.
Record level - ACH Trace Number
In addition to tracking the import and transmission logs, the system captures the ACH Trace Number.
The individual ACH Trace Number can be used to track the transaction throughout the ACH Network - as well as with third-party applications and assisting with returned transactions.
ACH Universal also maintains file import and transmittal logs. Below is an example of an import log, which includes, amongst other items: the Windows user login name and the workstation used.
Enable your system to backup your data and settings using our built-in automated desktop backup. The backup file can be sent to any shared drive on your network.
Not using our desktop edition? Use our SQL tools to trigger backups with SQL Express and SQL Server databases - or use the industry standard tools that you already use in-house.
ACH Universal can run on a desktop database, SQL Express or SQL Server.
The Gold Standard of Security
While each database has its advantages and disadvantages, Microsoft SQL Server provides the 'Gold Standard' of security.
It can be easily integrated into Active Directory, and managed with familiar tools such as Microsoft SQL Server Management Studio.
All data is locally stored at your location, behind your firewall - never in the cloud or on a site that you don't control.
Reminder: As Treasury Software has no access to your data, or software, you are responsible for backups. Feel free to use your current in-house backup tools, or use Treasury Software's backup features (see above).
Can Treasury Software access our Accounting System's (non-QuickBooks) database?
No, Treasury Software operates using data that is pushed to it, typically using a pass-through file such as Excel or a comma delimited (csv) file.
This enables Treasury Software to work with all major accounting packages as well as virtually all legacy systems.
Don't have SQL Server? No problem.
Treasury Software includes a copy of the SQL Express database engine for free when you license our Workgroups platform.
Our Segregation of Duties feature enables you to grant access and limit access to those based on their role.
Treasury Software uses a traditional Role and User environment, enabling you to assign permissions, so your users can import, create files and perform administrative tasks.
Transmit to your bank automatically and securely with our SSH-FTP client. SSH encrypts the tunnel, enabling you to send files securely.
ACH Universal includes the tools to create private and public keys, which you may need if exchanging keys with your bank.
SSH-FTP requires ACH Corporate or Processor editions.
ACH Universal provides you with the capability to encrypt any file with AES 256 encryption.
--is compatible with WinZip. Therefore, your bank - or any receiver - can decrypt using WinZip (assuming you supply them with the password)
--can be used for any file, not just for ACH files. Feel free to secure any file.
--is capable of both encrypting - as well as decrypting a file.